Metode Spread Spectrum untuk Penyisipan Pesan pada Citra Digital
DOI:
https://doi.org/10.47065/bulletincsr.v4i1.310Keywords:
Cryptography; PSNR; Spread Spectrum; SteganographyAbstract
Abstract The importance of the value of information in a message means that the message often does not reach the recipient, but instead falls into the hands of unwanted people. Various techniques are used to prevent access by unauthorized persons. One of the various techniques to protect this information is steganography, which is the hiding of a message inside another message to avoid suspicion that someone is trying to steal information. The initial stage of the insertion process is to perform a binary spread of the message characters with a scalar magnitude of 4 to produce a new segment followed by the generation of a random number (pseudonoise random number) using the steganography key and converted into binary form. Then proceed with modulation with XOR logic operation between the value of the binary segment and the line of random numbers that have been converted into binary to produce a new binary that will be inserted into the digital image object. The spread spectrum method produces quite good image quality after the insertion process, this can be proven by the PSNR test results which are more than 30 dB.
Downloads
References
C. Kaushal, K. Kaushal, and A. Singla, “Firefly optimization-based segmentation technique to analyse medical images of breast cancer,” Int. J. Comput. Math., vol. 98, no. 7, pp. 1293–1308, 2021, doi: 10.1080/00207160.2020.1817411.
R. R. Shofiyah & Kurniawan, “Pengaruh Jejaring Sosial Terhadap Eksistensi Sosial Budaya,” vol. x, no. x, pp. 1–17, 2020.
P. P. Nicolas, H. Soetanto, W. Wahyudi, and A. Rossi, “Sistem Pendukung Keputusan Pemilihan Karyawan Terbaik pada PT. XYZ dengan Metode Profile Matching dan Interpolasi,” J. Sist. dan Teknol. Inf., vol. 9, no. 2, p. 121, 2021, doi: 10.26418/justin.v9i2.44159.
I. Sholihin and F. Ariyani, “Perancangan Sistem Informasi Pendaftaran Anggota Baru Berbasis Web Pada UKMI Ar-Rahman Universitas Teknokrat Indonesia,” J. Data Min. dan Sist. Inf., vol. 4, no. 1, p. 23, 2023, doi: 10.33365/jdmsi.v4i1.2618.
H. Hammam, A. Asyhar, S. A. Wibowo, and G. Budiman, “Implementasi Dan Analisis Performansi Metode You Only Look Once ( Yolo ) Sebagai Sensor Pornografi Pada Video Implementation and Performance Analysis of You Only Look Once ( Yolo ) Method As Porn Censorship in Video,” 2020, vol. 7, no. 2, pp. 3631–3638.
H. Santoso, “Accuracy Improvement of Basal Stem Rot Disease Identification in Oil Palm Plantation Using Unmanned Aerial Vehicle and Machine Learning,” Indones. J. Oil Palm Res., vol. 31, no. 2, pp. 82–95, 2023, [Online]. Available: https://www.iopri.org/jurnalkelapasawit/index.php/jpks/article/view/218/146.
N. A. Husin, S. Khairunniza-Bejo, A. F. Abdullah, M. S. M. Kassim, D. Ahmad, and M. H. A. Aziz, “Classification of basal stem rot disease in oil palm plantations using terrestrial laser scanning data and machine learning,” Agronomy, vol. 10, no. 11, 2020, doi: 10.3390/agronomy10111624.
A. Hernandes, H. Hartini, and D. Sartika, “Steganografi Citra Menggunakan Metode Least Significant Bit (LSB) dan Linear Congruential Generator (LCG),” JATISI (Jurnal Tek. Inform. dan Sist. Informasi), vol. 5, no. 2, pp. 137–146, 2019, doi: 10.35957/jatisi.v5i2.134.
(Univ. Pend. Wiryawan, et al, “STEGANOGRAFI BERDASARKAN METODE LEAST SIGNIFICANT BIT (LSB) PADA CITRA DIGITAL DENGA TEKNIK KOMPRESI LOSSLES,” J. Ilmu Komput. Indones., vol. 4, no. 1, pp. 34–40, 2019.
Y. R. Nasution, M. Furqan, and M. Sinaga, “Implementasi Steganografi Menggunakan Metode Spread Spectrum Dalam Pengamanan Data Teks Pada Citra Digital,” J-SAKTI (Jurnal Sains Komput. dan Inform., vol. 4, no. 2, pp. 351–358, 2020.
R. Krithiga and P. Geetha, “Breast Cancer Detection, Segmentation and Classification on Histopathology Images Analysis: A Systematic Review,” Arch. Comput. Methods Eng., vol. 28, no. 4, pp. 2607–2619, 2021, doi: 10.1007/s11831-020-09470-w.
M. Dehghani et al., “Scaling Vision Transformers to 22 Billion Parameters,” Proc. Mach. Learn. Res., vol. 202, pp. 7480–7512, 2023.
F.-Z. Nakach, A. Idri, and H. Zerouaoui, “Deep Hybrid Bagging Ensembles for Classifying Histopathological Breast Cancer Images,” in Proceedings ofthe 15th International Conference on Agents and Artificial Intelligence (ICAART2023) - Volume 2, pa, 2023, vol. 2, no. Icaart, pp. 289–300, doi: 10.5220/0011704200003393.
A. W. Kusuma and R. L. Ellyana, “Penerapan Citra Terkompresi Pada Segmentasi Citra Menggunakan Algoritma K-Means,” J. Terap. Teknol. Inf., vol. 2, no. 1, pp. 65–74, 2018, doi: 10.21460/jutei.2018.21.65.
S. R. Saragih and D. P. Utomo, “Penarapan Algoritma Prefix Code Dalam Kompresi Data Teks,” KOMIK (Konferensi Nas. …, vol. 4, no. 1, pp. 249–252, 2020, doi: 10.30865/komik.v4i1.2691.
F. Setyatama and A. Irwankurnia, “Rapid Application Development (Rad) Method for Developing Clinical Laboratory Information System (Case Study: Pt. Populer Sarana Medika),” J. Electr. Eng. Comput. Sci., vol. 3, no. 2, pp. 421–430, 2018.
Bitlas Academy, “Apa itu RAD? Mengenal Salah Satu Metode Pengembangan Aplikasi,” Bitlabs. Bitlabs Academy, p. 1, 2020.
R. A. Sukamto and M. Shalahuddin, Rekayasa Perangkat Lunak Terstruktur dan Berorientasi Objek, Revisi. Bandung: Informatika Bandung, 2019.
I. W. A. W. Kusuma and A. Kusumadewi, “Analisa Perbandingan Citra Hasil Segmentasi Menggunakan Metode K-Means dan Fuzzy C Means pada Citra Input Terkompresi,” Elektrika, vol. 13, no. 2, pp. 63–70, 2021, doi: 10.26623/elektrika.v13i2.3182.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Metode Spread Spectrum untuk Penyisipan Pesan pada Citra Digital
ARTICLE HISTORY
How to Cite
Issue
Section
Copyright (c) 2023 Herri Setiawan, Bedy Briliant Wijaya, Dewi Sartika
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).