Desain dan Implementasi Aplikasi Steganografi Dual Mode Berbasis Java untuk Menyembunyikan Pesan Teks dan Gambar

Authors

  • Siti Sundari Universitas Malikussaleh, Indonesia Author
  • Mauliza Vazira Universitas Malikussaleh, Indonesia Author
  • Monica Annisa Fitri Universitas Malikussaleh, Indonesia Author
  • Hafizah Universitas Malikussaleh, Indonesia Author

DOI:

https://doi.org/10.62671/jikum.v2i2.201

Keywords:

Steganography, Information Security, Java, Base64, Data Hiding

Abstract

Steganography is a method of protecting information by hiding secret messages within a carrier medium, making their presence difficult for others to detect. This research aims to design and build a Java-based dual-mode steganography application that can hide text messages within text (text-to-text) and image messages within text (text-to-image). This application was created using the Java programming language with an object-oriented programming approach, and utilizes the Base64 encoding technique as a means of embedding data. The research methods applied included requirements analysis, system design, implementation, and application testing. The test results demonstrated that this application can effectively hide and extract text messages and images, while using a password as an additional layer of security. We hope this application can be a practical solution for maintaining the confidentiality of digital data, while also serving as a useful steganography learning tool for students.

References

Aruna, M. T. N., Nandika, L. R., Sneha, C. I., Xavier, imothy J., & George, T. M. (2023). Text, Image and Audio Steganography. International Journal for Research in Applied Science and Engineering Technology, 11(4), 4435–4439. https://doi.org/10.22214/ijraset.2023.51091

Ashari, I. F., Nugroho, E. D., Andrianto, D. D., Yusuf, M. A. N. M., & Alkarkhi, M. (2024). The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key. JITCE (Journal of Information Technology and Computer Engineering), 8(1), 8–18. https://doi.org/10.25077/jitce.8.1.8-18.2024

Choudhari, D., Hetvi Patel, H. P., Ghosh, A., Patil, N., Pawar, V., & Sonawane, Y. (2023). A Survey on Image Steganography using LSB Algorithm. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4671618

Kallapu, B., Janardhan, A. N., Hejamadi, R. M., Shrinivas, K. R. N., Saritha, Ramesh, R. K., & Gabralla, L. A. (2025). Multi-Layered Security Framework Combining Steganography and DNA Coding. Systems, 13(5), 1–27. https://doi.org/10.3390/systems13050341

Krisna, I Gusti Ngurah Febri Ananda Karyawati, A. E. (2024). Penerapan Teknik Steganografi LSB pada Format Gambar Modern. 2, 673–680.

Muhammad, A., Agus, A., Mujahid, M. R., Negeri, U., & Makassar, K. (n.d.). The Security of Recent LSB Steganography Algorithms for Protecting Secret Text Messages. 1, 12–16.

Patil, H. V, & Sonaje, V. P. (2024). Crypto-Stego: A Hybrid Method for Encrypting Text Messages or Text Files within Images Using AES and LSB Algorithms. Original Research Paper International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024(23s), 2780–2793. www.ijisae.org

Sari, I. P., Basri, M., & Syafrayani, P. R. (2025). Implementasi Sistem Aplikasi Pengolahan Teks pada Gambar Menggunakan Modifikasi Metode LSB dan ROT13. 0–7.

Satriyawibawa, M. Y., Andono, P. N., Soong, L. W., & Kiat, N. P. (2024). LSB-2 Steganography with Brotli Compression and base64 Encoding for Improving Data Embedding Capacity. Sinkron, 8(2), 878–884. https://doi.org/10.33395/sinkron.v8i2.13264

Trithemius, J. (n.d.). Steganography.

Downloads

Published

2026-06-01

How to Cite

Sundari, S. ., Vazira, M. ., Fitri, M. A., & Hafizah, H. (2026). Desain dan Implementasi Aplikasi Steganografi Dual Mode Berbasis Java untuk Menyembunyikan Pesan Teks dan Gambar. JIKUM: Jurnal Ilmu Komputer, 2(2), 170-177. https://doi.org/10.62671/jikum.v2i2.201

How to Cite

Sundari, S. ., Vazira, M. ., Fitri, M. A., & Hafizah, H. (2026). Desain dan Implementasi Aplikasi Steganografi Dual Mode Berbasis Java untuk Menyembunyikan Pesan Teks dan Gambar. JIKUM: Jurnal Ilmu Komputer, 2(2), 170-177. https://doi.org/10.62671/jikum.v2i2.201