Application of Text Message Held in Image Using Combination of Least Significant Bit Method and One Time Pad

https://doi.org/10.22146/ijccs.46401

Eferoni Ndruru(1*), Taronisokhi Zebua(2)

(1) STMIK Budi Darma Medan
(2) STMIK Budi Darma Medan
(*) Corresponding Author

Abstract


Stenography and security are one of the techniques to develop art in securing data. Stenography has the most important aspect is the level of security in data hiding, which makes the third party unable to detect some information that has been secured. Usually used to hide textinformationThe (LSB) algorithm is one of the basic algorithms proposed by Arawak and Giant in 1994 to determine the frequent item set for Boolean association rules. A priory algorithm includes the type of association rules in data mining. The rule that states associations between attributes are often called affinity analysis or market basket analysis. OTP can be widely used in business. With the knowledge of text message, concealment techniques will make it easier for companies to know the number of frequencies of sales data, making it easier for companies to take an appropriate transaction action. The results of this study, hide the text message on the image (image) by using a combination of LSB and Otp methods.


Keywords


Cryptography; steganography; LSB and OTP algorithms

Full Text:

PDF


References

Dian Hafidh Zulfikar, Agus Harjoko “Perbandingan Kapasitas Pesan padaSteganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement” IJEIS (Indonesian J. Electron.Instrum. Syst., Vol 7, No 1, pp. 35-46, januari, 2016, [online]. Available : https://jurnal.ugm.ac.id/ijccs/article/view/11187 [Accessed: 20-Januari-2016]
[2] Devid Haryalesmana Wahid, Azhari SN “Peringkasan Sentimen Esktraktif di Twitter Menggunakan Hybrid TF-IDF dan Cosine Similarity” IJEIS (Indonesian J. Electron.Instrum. Syst., Vol 10, No 2, july 2016, pp.207-218 [online]. Available : https://jurnal.ugm.ac.id/ijccs/article/view/16625, [Accessed: 20-July-2016]
[3] Eferoni Ndruru, Fince Tinus Waruwu, Anda Yanny “alokasi pekerja pada suatu proyek dengan metode hungarian (studi kasus: pt. ira widya utama medan)” ejurnal, Vol 1, No 1 ,20 Oktober 2017, Available http://ejurnal.stmik-budidarma.ac.id/index.php/komik/article/view/500. [Accessed: 15-Oktober-2017]
[4] Taronisokhi Zebua, Eferoni Ndruru,”Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma Rc4”, Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK),Vol. 4, No. 4, Desember 2017, hlm. 275-282,[online], available: http://jtiik.ub.ac.id/index.php/jtiik/article/view/474, [Accessed 10-Desember-2017]
[5] ZEBUA, T. 2015. Penerapan Metode LSB-2 untuk Menyembunyikan Ciphertext pada Citra Digital. Pelita Inform. Budi Darma, vol. 10, no. 3, pp. 135–140.[online] Available : https://www.researchgate.net/publication/318420491, [Accessed 20 jauari 2017]
[6] Mahmuddin Yunus, Agus Harjoko,” Penyembunyian Data Pada File Video Menggunakan Metode Lsb Dan Dct,” IJCCS (Indonesian Journal of Computing and Cybernetics Systems)Vol 8, No 1 januari 2014) [online] Available: https://jurnal.ugm.ac.id/ijccs/article/view/3498. [accessed 8 januari 2014]
[7] Dian Hafidh Zulfikar, Agus Harjoko ,”Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement’, IJCCS (Indonesian Journal of Computing and Cybernetics Systems/view’,Vol 8, No 1 maret (2016) [online]: Available https://jurnal.ugm.ac.id/ijccs/article/view/11187, [accessed 9 maret 2016].
[8] Manik, “Klasifikasi Belimbing Menggunakan Naïve Bayes Berdasarkan Fitur
Warna RGB” (Indonesia Journal of computing and cybernetics System),
[online] Vol 11 No. 1, 13 mei,2017, [online], Available
:https://jurnal.ugm.ac.id/ijccs/article/view/1783, accessed [16 mei 2017]
[9] P. Biaya, P. Barang, P. Cv, E. Nias, and S. A. Hutabarat, “Implementasi Metode Vogel ’ s Approximation Method Pada,” vol. 3, no. 1, pp. 12–15, 2018.
[10] T. Zebua, R. K. Hondro, and E. Ndruru, “Message Security on Chat App based on Massey Omura Algorithm,” Int. J. Inf. Syst. Technol., vol. 1, no. 2, pp. 16–23, 2018.
[11] F. T. Waruwu, E. Buulolo, E. Ndruru, K. Kunci, A. Apriori, and R. Penyakit, “KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) IMPLEMENTASI ALGORITMA APRIORI PADA ANALISA POLA DATA PENYAKIT MANUSIA YANG DISEBABKAN OLEH ROKOK.”
[12] E. Andreas, “Aplikasi Kriptografi File DOC, DOCX, JPG dan PDF dengan Metode AES dan Kompresi Huffman,” Kriptografi AES Dengan Kompresi Huffman, p. 8, 2014.
[13] “Algoritma Kriptografi Aes Rijbdael,” TESLA J. Tek. Elektro UNTAR, vol. 8, no. 2, pp. 97–101, 2006.



DOI: https://doi.org/10.22146/ijccs.46401

Article Metrics

Abstract views : 2638 | views : 2136

Refbacks

  • There are currently no refbacks.




Copyright (c) 2019 IJCCS (Indonesian Journal of Computing and Cybernetics Systems)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.



Copyright of :
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN 1978-1520 (print); ISSN 2460-7258 (online)
is a scientific journal the results of Computing
and Cybernetics Systems
A publication of IndoCEISS.
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Fax: +62274 555133
email:ijccs.mipa@ugm.ac.id | http://jurnal.ugm.ac.id/ijccs



View My Stats1
View My Stats2