Perancangan Dan Implementasi Aplikasi Steganografi Gambar Berbasis GUI Untuk Keamanan Pesan
DOI:
https://doi.org/10.62671/jikum.v2i2.213Keywords:
Steganography, Digital image, Least Significant Bit (LSB), Message Security, GUI ApplicationAbstract
Steganography is one of the information hiding techniques aimed at maintaining message confidentiality by embedding secret data into digital media without causing noticeable visual changes. This research focuses on the design and implementation of an image steganography application with a Graphical User Interface (GUI) that enables users to embed and extract secret text messages from digital images easily and practically. The Least Significant Bit (LSB) method is employed as the main approach, where message bits are inserted into the least significant bits of image pixels without significantly altering the visual quality of the stego-image. The development stages include requirement analysis, system design, interface design, application implementation using the Python programming language, and functional testing of message embedding and extraction features. Experimental results show that the application is able to embed text messages into digital images successfully and the hidden messages can be retrieved correctly without data loss. In addition, the stego-images do not exhibit noticeable visual differences compared to the original images, indicating that the embedded messages are not easily detected. Therefore, the developed application is considered effective as a supporting tool for maintaining message confidentiality in digital communication.
References
Ardiansyah, R., & Kurniawan, A. (2020). Implementasi Steganografi Menggunakan Metode Least Significant Bit (LSB) pada Citra Digital. Jurnal Teknologi Informasi dan Komunikasi, 8(2), 45-52. https://doi.org/10.28989/jtik.v8i2.234
Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2010). Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing, 90(3), 727-752. https://doi.org/10.1016/j.sigpro.2009.08.010
Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB Steganography in Color and Gray-Scale Images. IEEE Multimedia, 8(4), 22-28. https://doi.org/10.1109/93.959097
Ilham, D. N., Hardisal, H., Balkhaya, B., Candra, R. A., & Sipahutar, E. (2019). Heart Rate Monitoring and Stimulation with the Internet of Thing-Based (IoT) Alquran Recitation. SinkrOn, 4(1), 221. https://doi.org/10.33395/sinkron.v4i1.10392
Ilham, D. N., Satria, E., Anugreni, F., Candra, R. A., & Kusumo, H. N. R. A. (2021). Rain Monitoring System for Nutmeg Drying Based on Internet of Things. Journal of Computer Networks, Architecture, and High-Performance Computing, 3(1), 52–57. https://doi.org/10.47709/cnahpc.v3i1.933
Johnson, N. F., & Jajodia, S. (1998). Exploring Steganography: Seeing the Unseen. Computer, 31(2), 26-34. https://doi.org/10.1109/MC.1998.4655281
Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2019). Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research. Neurocomputing, 335, 299-326. https://doi.org/10.1016/j.neucom.2018.06.075
Ker, A. D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J., & Pevný, T. (2013). Moving Steganography and Steganalysis from the Laboratory into the Real World. In Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security (pp. 45-58). ACM. https://doi.org/10.1145/2482513.2482965
Mandal, P. C., & Mukherjee, I. (2013). A Novel Approach to Image Steganography using LSB Algorithm. International Journal of Computer Applications, 68(13), 1-6. https://doi.org/10.5120/11650-7235
Morkel, T., Eloff, J. H., & Olivier, M. S. (2005). An Overview of Image Steganography. In ISSA 2005 (pp. 1-11). Information Security South Africa.
Petitcolas, F. A., Anderson, R. J., & Kuhn, M. G. (1999). Information Hiding: A Survey. Proceedings of the IEEE, 87(7), 1062-1078. https://doi.org/10.1109/5.771065
Provos, N., & Honeyman, P. (2003). Hide and Seek: An Introduction to Steganography. IEEE Security & Privacy, 1(3), 32-44. https://doi.org/10.1109/MSECP.2003.1203220
Subhedar, M. S., & Mankar, V. H. (2014). Current Status and Key Issues in Image Steganography: A Survey. Computer Science Review, 13-14, 95-113. https://doi.org/10.1016/j.cosrev.2014.09.001
Thien, C. C., & Lin, J. C. (2003). A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function. Pattern Recognition, 36(12), 2875-2881. https://doi.org/10.1016/S0031-3203(03)00221-8
Wang, H., & Wang, S. (2004). Cyber Warfare: Steganography vs. Steganalysis. Communications of the ACM, 47(10), 76-82. https://doi.org/10.1145/1022594.1022597
Wu, D. C., & Tsai, W. H. (2003). A Steganographic Method for Images by Pixel-Value Differencing. Pattern Recognition Letters, 24(9-10), 1613-1626. https://doi.org/10.1016/S0167-8655(02)00402-6



