Perancangan Dan Implementasi Aplikasi Steganografi Gambar Berbasis GUI Untuk Keamanan Pesan

Authors

  • Fijri Ahmad Yasin Universitas Malikussaleh, Indonesia Author
  • Rahman Shobirin Universitas Malikussaleh, Indonesia Author
  • Alwandi Hakim Universitas Malikussaleh, Indonesia Author
  • Muhammad Hamdan Quddri Lubis Universitas Malikussaleh, Indonesia Author

DOI:

https://doi.org/10.62671/jikum.v2i2.213

Keywords:

Steganography, Digital image, Least Significant Bit (LSB), Message Security, GUI Application

Abstract

Steganography is one of the information hiding techniques aimed at maintaining message confidentiality by embedding secret data into digital media without causing noticeable visual changes. This research focuses on the design and implementation of an image steganography application with a Graphical User Interface (GUI) that enables users to embed and extract secret text messages from digital images easily and practically. The Least Significant Bit (LSB) method is employed as the main approach, where message bits are inserted into the least significant bits of image pixels without significantly altering the visual quality of the stego-image. The development stages include requirement analysis, system design, interface design, application implementation using the Python programming language, and functional testing of message embedding and extraction features. Experimental results show that the application is able to embed text messages into digital images successfully and the hidden messages can be retrieved correctly without data loss. In addition, the stego-images do not exhibit noticeable visual differences compared to the original images, indicating that the embedded messages are not easily detected. Therefore, the developed application is considered effective as a supporting tool for maintaining message confidentiality in digital communication.

References

Ardiansyah, R., & Kurniawan, A. (2020). Implementasi Steganografi Menggunakan Metode Least Significant Bit (LSB) pada Citra Digital. Jurnal Teknologi Informasi dan Komunikasi, 8(2), 45-52. https://doi.org/10.28989/jtik.v8i2.234

Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2010). Digital Image Steganography: Survey and Analysis of Current Methods. Signal Processing, 90(3), 727-752. https://doi.org/10.1016/j.sigpro.2009.08.010

Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB Steganography in Color and Gray-Scale Images. IEEE Multimedia, 8(4), 22-28. https://doi.org/10.1109/93.959097

Ilham, D. N., Hardisal, H., Balkhaya, B., Candra, R. A., & Sipahutar, E. (2019). Heart Rate Monitoring and Stimulation with the Internet of Thing-Based (IoT) Alquran Recitation. SinkrOn, 4(1), 221. https://doi.org/10.33395/sinkron.v4i1.10392

Ilham, D. N., Satria, E., Anugreni, F., Candra, R. A., & Kusumo, H. N. R. A. (2021). Rain Monitoring System for Nutmeg Drying Based on Internet of Things. Journal of Computer Networks, Architecture, and High-Performance Computing, 3(1), 52–57. https://doi.org/10.47709/cnahpc.v3i1.933

Johnson, N. F., & Jajodia, S. (1998). Exploring Steganography: Seeing the Unseen. Computer, 31(2), 26-34. https://doi.org/10.1109/MC.1998.4655281

Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2019). Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research. Neurocomputing, 335, 299-326. https://doi.org/10.1016/j.neucom.2018.06.075

Ker, A. D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J., & Pevný, T. (2013). Moving Steganography and Steganalysis from the Laboratory into the Real World. In Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security (pp. 45-58). ACM. https://doi.org/10.1145/2482513.2482965

Mandal, P. C., & Mukherjee, I. (2013). A Novel Approach to Image Steganography using LSB Algorithm. International Journal of Computer Applications, 68(13), 1-6. https://doi.org/10.5120/11650-7235

Morkel, T., Eloff, J. H., & Olivier, M. S. (2005). An Overview of Image Steganography. In ISSA 2005 (pp. 1-11). Information Security South Africa.

Petitcolas, F. A., Anderson, R. J., & Kuhn, M. G. (1999). Information Hiding: A Survey. Proceedings of the IEEE, 87(7), 1062-1078. https://doi.org/10.1109/5.771065

Provos, N., & Honeyman, P. (2003). Hide and Seek: An Introduction to Steganography. IEEE Security & Privacy, 1(3), 32-44. https://doi.org/10.1109/MSECP.2003.1203220

Subhedar, M. S., & Mankar, V. H. (2014). Current Status and Key Issues in Image Steganography: A Survey. Computer Science Review, 13-14, 95-113. https://doi.org/10.1016/j.cosrev.2014.09.001

Thien, C. C., & Lin, J. C. (2003). A Simple and High-Hiding Capacity Method for Hiding Digit-by-Digit Data in Images Based on Modulus Function. Pattern Recognition, 36(12), 2875-2881. https://doi.org/10.1016/S0031-3203(03)00221-8

Wang, H., & Wang, S. (2004). Cyber Warfare: Steganography vs. Steganalysis. Communications of the ACM, 47(10), 76-82. https://doi.org/10.1145/1022594.1022597

Wu, D. C., & Tsai, W. H. (2003). A Steganographic Method for Images by Pixel-Value Differencing. Pattern Recognition Letters, 24(9-10), 1613-1626. https://doi.org/10.1016/S0167-8655(02)00402-6

Downloads

Published

2026-06-01

How to Cite

Yasin, F. A., Shobirin, R. ., Hakim, A., & Lubis, M. H. Q. (2026). Perancangan Dan Implementasi Aplikasi Steganografi Gambar Berbasis GUI Untuk Keamanan Pesan. JIKUM: Jurnal Ilmu Komputer, 2(2), 154-160. https://doi.org/10.62671/jikum.v2i2.213

How to Cite

Yasin, F. A., Shobirin, R. ., Hakim, A., & Lubis, M. H. Q. (2026). Perancangan Dan Implementasi Aplikasi Steganografi Gambar Berbasis GUI Untuk Keamanan Pesan. JIKUM: Jurnal Ilmu Komputer, 2(2), 154-160. https://doi.org/10.62671/jikum.v2i2.213