Implementasi Steganografi Multi-File Menggunakan Metode Metadata PNG untuk Keamanan Data Multimedia
DOI:
https://doi.org/10.62671/jikum.v2i2.170Keywords:
Steganography, PNG Metadata, Multi-File Embedding, Multimedia Security, Data HidingAbstract
The rapid growth of digital multimedia increases the risk of unauthorized access and data leakage, requiring effective techniques to enhance data security. Steganography is one approach that conceals information within digital media to prevent detection. This research aims to implement a multi-file steganography system using the PNG metadata method to secure multimedia data. The proposed approach embeds multiple files into the metadata section of PNG images without altering the visual quality of the carrier image, thereby maintaining imperceptibility. The methodology involves analyzing PNG metadata structures, designing an embedding and extraction mechanism for multiple files, and implementing the system using a software-based approach. Experimental results demonstrate that the proposed method is capable of securely embedding and extracting multiple files while preserving image integrity and file authenticity. The use of PNG metadata provides sufficient capacity and flexibility for multi-file steganography, making it suitable for secure multimedia data storage and transmission. Overall, the proposed implementation shows that metadata-based steganography can be an effective and efficient solution for enhancing multimedia data security.
References
Fadlan, M., Haryansyah, & Rosmini. (2021). Three Layer Encryption Protocol: An Approach of Super Encryption Algorithm. 3rd International Conference on Cybernetics and Intelligent Systems, ICORIS 2021, XVII(April), 194–198. https://doi.org/10.1109/ICORIS52787.2021.9649574
Fernando, Y., Darwis, D., Mehta, A. R., & Wantoro, A. (2024). INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION journal homepage : www.joiv.org/index.php/joiv INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION A New Approach of Steganography on Image Metadata. 8(May), 968–976. www.joiv.org/index.php/joiv
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168–187.
Hidayat, S., Andono, P. N., Informatika, T., & Nuswantoro, U. D. (2025). Analisis Keamanan Steganografi Multi-Layer dengan Enkripsi Vigenère dan Caesar Cipher pada Citra Digital Security Analysis of Multi-Layer Steganography with Vigenère Encryption and Caesar Cipher on Digital Images. JPTI:Jurnal Pendidikan Dan Teknologi Indonesia, 5(3), 869–880.
Kaunang, V. V., Djamen, A. C., & Kainde, Q. C. (2024). Implemetasi Steganografi Pada Citra Digital Menggunakan Metode Least Significant Bit Dengan Kriptografi Super Enskripsi. Journal of Informatics, Bussines, Education, and Innovation Technology, 2(3), 75–89. https://jibeit.teknikinformatika.org/index.php/jibeit/issue/view/5
Lutfi, M. F., & Yogyakarta, U. T. (n.d.). Implementation of Least Significant Bit Steganography for Securing Electronic Land Certificates. 4(4), 2254–2262.
Morkel, T., Olivier, M. S., & Eloff, J. H. . (2005). an Overview of Image Steganography. Africa, 83(July), 51–107. http://martinolivier.com/open/stegoverview.pdf
Ogiela, M. R., & Koptyra, K. (2015). False and multi-secret steganography in digital images. Soft Computing, 19(11), 3331–3339. https://doi.org/10.1007/s00500-015-1728-z
Pancheshwar, S., Shelke, S. N., Ghatole, P. J., & Namita, P. (2024). Image Steganography: Learn How To Hide Data in Images. International Research Journal of Modernization in Engineering Technology and Science, 03, 2165–2170. https://doi.org/10.56726/irjmets50665
Salwa Mohammed Nejrs, Azmi Shawkat Abdulbaqi. (2025). Integrating Multiple Steganographic Techniques for Medical Image Data Security Enhancement in Healthcare Systems: Security-Enhanced Steganography. Journal of Information Systems Engineering and Management, 10(32s), 390–397. https://doi.org/10.52783/jisem.v10i32s.5316
Sengupta, R., & Umarani, C. (2021). Steganography Using Python. IITM Journal of Management and IT, 12(1), 40–43.



