Steganografi QR Code pada Dual Carrier Image dengan Metode Least Significant Bit
Abstract
Image Steganography adalah teknik untuk menyisipkan pesan rahasia ke dalam suatu citra digital, sehingga secara kasat mata manusia tidak akan mengetahui keberadaan dari pesan rahasia tersebut. Tujuan dari penetilian ini adalah menggunakan citra QR Code sebagai secret yang diubah ke dalam mode bitonal dengan 1 bit pada tiap pikselnya kemudian dipecah menjadi dua bagian dan disisipkan kedalam blue channel di dual carrier image sehingga kapasitas dari pesan yang akan disisipkan dapat meningkat. Penyisipan pada dual carrier image juga dapat meningkatkan keamanan karena pesan dapat dikirim secara terpisah. Penyisipan pesan dilakukan dengan metode substitusi Least Significant Bit (LSB). Untuk mengevaluasi model steganography yang diteliti, digunakan pengujian MSE and PSNR, Hiding Capacity (HC), Histogram, recovery dan noise. Hasil pengujian menunjukkan dengan menggunakan citra PNG dan TIFF pada HC hingga 95% nilai PSNR tetap tinggi yaitu sebesar 56 dB, dengan tingkat recovery 100% dan tahan terhadap jenis noise salt and pepper.
Keywords
Full Text:
PDFReferences
P. Survase and P. Survase, “Qr code based image steganography with enhanced image quality and compression,” Int. J. Innov. Res. Sci. Technol., vol. 2, no. 5, pp. 104–112, 2015.
B. S. Champakamala, K. Padmini, R. D. K. A. Professors, and D. Bosco, “Least Significant Bit algorithm for image steganography Overview of Steganography,” Int. J. Adv. Comput. Technol., vol. 3, no. 4, p. 5, 2014.
S. Sharda and S. Budhiraja, “Image steganography: A review,” Int. J. Emerg. Technol. Adv. Eng., vol. 3, no. 1, pp. 707–710, 2013.
M. Juneja and P. S. Sandhu, “Improved LSB based steganography techniques for color images in spatial domain,” Int. J. Netw. Secur., vol. 16, no. 6, pp. 452–462, 2014.
G. Maji, S. Mandal, S. Sen, and N. C. Debnath, “Dual image based LSB steganography,” in Proceedings - 2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications and Computing, SIGTELCOM 2018, 2018, vol. 2018-January, pp. 61–66.
J.-W. Wang, “Nested image steganography scheme using QR-barcode technique,” Opt. Eng., vol. 48, no. 5, p. 057004, 2009.
D. R. I. M. Setiadi, H. A. Santoso, E. H. Rachmawanto, and C. A. Sari, “An improved message capacity and security using divide and modulus function in spatial domain steganography,” in 2018 International Conference on Information and Communications Technology, ICOIACT 2018, 2018, vol. 2018-January, pp. 186–190.
M. Hussain, A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, and K. H. Jung, “Image steganography in spatial domain: A survey,” Signal Process. Image Commun., vol. 65, pp. 46–66, 2018.
A. Warang and A. Patankar, “QR Code Based Image Steganography,” vol. 3, no. 3. pp. 1100–1105, 2017.
K. Joshi, P. Dhankhar, and R. Yadav, “A new image steganography method in spatial domain using XOR,” in 12th IEEE International Conference Electronics, Energy, Environment, Communication, Computer, Control: (E3-C3), INDICON 2015, 2016, pp. 1–6.
E. Zielińska, W. Mazurczyk, and K. Szczypiorski, “The magazine archive includes every article published in Communications of the ACM for over the past 50 years.,” Commun. ACM, vol. 57, no. 3, pp. 86–95, 2014.
A. Sathyan, M. Thirugnanam, and S. Hazra, “A novel RGB based steganography using prime component alteration technique,” IIOAB J., vol. 7, no. 5, pp. 58–73, 2016.
A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.
S. Singh and J. Kaur, “Odd-Even Message Bit Sequence Based Image Steganography,” Int. J. Comput. Sci. Inf. Technol., vol. 6, no. 4, pp. 3930–3932, 2015.
M. M. Hashim and M. S. Mohd Rahim, “Image steganography based on odd/even pixels distribution scheme and two parameters random function,” J. Theor. Appl. Inf. Technol., vol. 95, no. 22, pp. 5977–5986, 2017.
R. Munir, “SteganografidanWatermaking,” BahanKuliah ke-7, 2004.
Z. Y. Al-Omari and A. T. Al-Taani, “Secure LSB steganography for colored images using character-color mapping,” in 2017 8th International Conference on Information and Communication Systems, ICICS 2017, 2017, pp. 104–110.
A. Cheddad, J. Condell, K. Curran, and P. McKevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, 2010.
M. S. Subhedar and V. H. Mankar, “Current status and key issues in image steganography: A survey,” Comput. Sci. Rev., vol. 13–14, no. C, pp. 95–113, 2014.
DOI: https://doi.org/10.26418/jp.v5i3.35297
Refbacks
- There are currently no refbacks.