Tinjauan Literatur: Evaluasi Metode Least Significant Bit (LSB) dalam Steganografi Berdasarkan Alasan Penggunaan dan Efektivitasnya terhadap Keamanan Data Digital

Authors

  • Hadaya Imtiyaza Syarifa Universitas Amikom Purwokerto, Indonesia Author
  • Livia Febriati Universitas Amikom Purwokerto, Indonesia Author
  • Vannianti Nabilla Putri Universitas Amikom Purwokerto, Indonesia Author

DOI:

https://doi.org/10.62671/jikum.v2i2.241

Keywords:

Steganography, Least Significant Bit, Data Security, Systematic Literature Review, Digital Data Security.

Abstract

The rapid development of information technology has facilitated the exchange of digital data, but it has also given rise to various threats to information security. Steganography is one technique used to hide confidential data, with the Least Significant Bit (LSB) method being the most widely used approach due to its simplicity. This article aims to evaluate the reasons for using the LSB method in steganography, its weaknesses, and its effectiveness in digital data security. This study uses the Systematic Literature Review (SLR) method by reviewing relevant scientific articles obtained through the Google Scholar database. The literature selection process was carried out systematically using the PRISMA protocol. The results of the study show that the LSB method is widely used because of its ease of implementation, processing speed, adequate insertion capacity, and ability to maintain the visual quality of the disguised image. However, this method has limitations, particularly low resistance to noise, lossy compression, image manipulation, and steganalysis attacks when used alone. Therefore, the LSB method is considered quite effective for visual concealment, but it needs to be combined with additional security techniques to improve digital data security.

References

Al Akbar, A., Sumadi, M. T., & Faldi, F. (2024). Implementation of Lsb and Playfair Methods To Secure Text Files Into Wav Audio Files. Jurnal Teknik Informatika (Jutif), 5(6), 1529–1537. https://doi.org/10.52436/1.jutif.2024.5.6.1793

Habibi, R., & Manurung, A. G. R. (2023). SLR Systematic Literature Review: Metode Penilaian Kinerja Karyawan Menggunakan Human Performance Technology. Journal of Applied Computer Science and Technology, 4(2), 100–107. https://doi.org/10.52158/jacost.v4i2.511

Hasan, N. F., Dengen, C. N., & Ariyus, D. (2020). Analisis Histogram Steganografi Least Significant Bit Pada Citra Grayscale. Digital Zone: Jurnal Teknologi Informasi Dan Komunikasi, 11(1), 20–29. https://doi.org/10.31849/digitalzone.v11i1.3413

Joshi, R., Gagnani, L., & Pandey, S. (2013). Image Steganography With LSB. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(1), 228–229.

Mido, A. R., & Ujianto, E. I. H. (2022). ANALISIS PENGARUH CITRA TERHADAP KOMBINASI KRIPTOGRAFI RSA DAN STEGANOGRAFI LSB. Jurnal Teknologi Informasi Dan Ilmu Komputer (JTIIK), 9(2), 279–286.

Mohan, K. J., & Saini, A. K. (2023). Assessing Information Security Governance in Public Sector Banks of India. International Journal of Engineering Technology and Management Sciences, 7(5), 103–116. https://doi.org/10.46647/ijetms.2023.v07i05.012

Prayogo, A. I., Nugraha, A., Novanto, T. F., & Kurniawan, J. C. (2024). Enhancing Least Significant Bit Steganography Image Fidelity Using Brotli Compression. Sinkron, 9(1), 285–295. https://doi.org/10.33395/sinkron.v9i1.13186

Ramadhani, A. M., & Hasanuddin, T. (2021). Modifikasi Least Significant Bits pada Gambar sebagai Data Hiding Steganography. Indonesian Journal of Data and Science (IJODAS), 2(2), 91–102. https://doi.org/10.56705/ijodas.v2i3.48

Rantelinggi, P. H., & Saputra, E. (2020). Algoritma Kriptografi Triple Des dan Steganografi LSB sebagai Metode Gabungan dalam Keamanan Data. Jurnal Teknologi Informasi Dan Ilmu Komputer (JTIIK), 7(4), 661–666. https://doi.org/10.25126/jtiik.2020741838

Rizqa, I., Safitri, A. N., & Harkespan, I. (2022). Kriptostegano Menggunakan Data Encryption Standard dan Least Significant Bit dalam Pengamanan Pesan Gambar. Jurnal Masyarakat Informatika, 13(2), 111–120. https://doi.org/10.14710/jmasif.13.2.44547

Santoso, K. A., Wiraga, A. T., & Riski, A. (2022). Penyembunyian Pesan Terenkripsi pada Citra menggunakan Algoritma LSB dan Transposisi Kolom. Journal of Applied Informatics and Computing, 6(1), 25–30. https://doi.org/10.30871/jaic.v6i1.3819

Sidiq, R. F., Rahayu, R. E. G., & Supriatna, A. D. (2023). Implementasi Kriptografi Advanced Encryption Standard dan Least Significant Bit untuk Keamanan Pesan Email dalam Gambar. Jurnal Algoritma, 20(2), 305–315. https://doi.org/10.33364/algoritma/v.20-2.1407

Sulistyo, I., & Aribowo, E. (2020). Implementasi Algoritma Hybrid dan Metode Least Significant Bit Untuk Keamanan Data. Jurnal Informatika: Jurnal Pengembangan IT, 5(3), 70–76. https://doi.org/10.30591/jpit.v5i3.2050

Syahril, M., & Jaya, H. (2019). Aplikasi Steganografi Pengamanan Data Nasabah di Standard Chartered Bank Menggunakan Metode Least Significant Bit dan RC4. Sensasi, 505–509. http://prosiding.seminar-id.com/index.php/sensasi/issue/archivePage%7C505

Syawal, M. F., Fikriansyah, D. C., & Agani, N. (2016). Implementasi Teknik Steganografi Menggunakan Algoritma Vigenere Cipher Dan Metode LSB. Jurnal TICOM, 4(3), 91–99. https://www.neliti.com/publications/93707/

Wati, V., Sa’diyah, H., & Ariyus, D. (2020). Pendekatan Stego-Kripto Mode Cipher Block Chaining Untuk Pengamanan Informasi Pada Citra Digital. JITK (Jurnal Ilmu Pengetahuan Dan Teknologi Komputer), 5(2), 197–204. https://doi.org/10.33480/jitk.v5i2.1160

Wibisono, G., Waluyo, T., & Ujianto, E. I. H. (2020). Kajian Metode Metode Steganografi Pada Domain Spasial. JITK (Jurnal Ilmu Pengetahuan Dan Teknologi Komputer), 5(2), 259–264. https://doi.org/10.33480/jitk.v5i2.1212

Wildan, M., & Ashari, W. M. (2024). Text Data Security Using LCG and CBC with Steganography Technique on Digital Image. Journal of Applied Informatics and Computing, 8(2), 400–407. https://doi.org/10.30871/jaic.v8i2.8457

Yusup, I. M., Carudin, C., & Purnamasari, I. (2020). Implementasi Algoritma Caesar Cipher Dan Steganografi Least Significant Bit Untuk File Dokumen. Jurnal Teknik Informatika Dan Sistem Informasi, 6(3), 434–441. https://doi.org/10.28932/jutisi.v6i3.2817

Zhao, D., & Gao, Y. (2024). Information Security and Privacy Protection Strategies in the Process of Electronic Archiving. Journal of Electrical Systems, 20(6s), 374–380. https://doi.org/10.52783/jes.2658

Downloads

Published

2026-06-04

How to Cite

Syarifa, H. I. ., Febriati, L. ., & Putri, V. N. . (2026). Tinjauan Literatur: Evaluasi Metode Least Significant Bit (LSB) dalam Steganografi Berdasarkan Alasan Penggunaan dan Efektivitasnya terhadap Keamanan Data Digital. JIKUM: Jurnal Ilmu Komputer, 2(2), 305-310. https://doi.org/10.62671/jikum.v2i2.241

How to Cite

Syarifa, H. I. ., Febriati, L. ., & Putri, V. N. . (2026). Tinjauan Literatur: Evaluasi Metode Least Significant Bit (LSB) dalam Steganografi Berdasarkan Alasan Penggunaan dan Efektivitasnya terhadap Keamanan Data Digital. JIKUM: Jurnal Ilmu Komputer, 2(2), 305-310. https://doi.org/10.62671/jikum.v2i2.241