IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 4, April 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Modification Of Least Significant Bit Method With Redundant Pattern Encoding For Protection Of Message Integration From Image Modification

[Full Text]

 

AUTHOR(S)

Aldi Wiliar Wira Permana , Silvester Dian Handy Permana, Yaddarabullah

 

KEYWORDS

Steganography, Message Insertion, Least Significant Bit, Redundant Pattern Encoding, algorithm modification, Protection Message, Image Modification.

 

ABSTRACT

Steganography is one way to hide messages on a media image. One method used in steganography is the Least Significant Bit (LSB) method. But in the LSB method there are still gaps to damage the message in the image if the image is modified. The most important aspect of steganography is the level of information hiding. Where it refers to how much the inability of a third party to detect the existence of hidden information. There is a way to avoid this gap by modifying the Least Significant Bit method with Redundant Pattern Encoding. With the RPE method, the gap in the LSB method can be overcome, because this method divides the two parts in the image, namely Patch A with Patch B, then incorporates the redundancy (multiplication) of messages into each patch in the image. The results of this study that modify the Least Significant Bit method with Redundant Pattern Encoding, namely, the image can survive if it undergoes Segmentation, Image Compression and Image Enhancement, where in Image Enhancement if the image experiences Sharpness with a maximum level of 25%, the image cannot survive if it is given Color Image Processing and Noise as a whole on both Patches.

 

REFERENCES

[1] Anwar., N (2018). Designing Hidden Message Steganography with Matlab Based Least Significant Bit Insertion (LSB) Method.
[2] Arifiansyah, F., Suciati, N., & Wijaya, A.Y. (2012). Implementation of Boosted Steganography Scheme with Image Preprocessing Using Histogram Equalization.
[3] Bhatt, K, R. & Shah, H. (2017). Various Methodologies for Steganography: its Detection and Evaluation.
[4] Champakamala, B.S., Padmini, K., Radhika, D.K (ISSN: 2319-7900) Least Significant Bit Algorithm for Image Steganography.
[5] Elanda, S.K.Y., & Pakareng, M.E.I. (2016). Design and Implementation of Steganography Using the Redundant Pattern Encoding Method with AES (Advanced Encryption Standard) Algorithm.
[6] Hati, K. & Prasetyo, H. Use of the Least Significant Bit (LSB) Method in Making Steganography Applications.
[7] Hashim, M, M., Rahim, M, S, M. (2017). Image Steganography Based on Odd / Event Pixels Distribution Scheme and Two Parameters Random Function.
[8] Hidayat, E.Y. & Hastuti, K. (2013). Steganographic Analysis of the Least Significant Bit (LSB) Method with Quantitative and Random Insertion Quantitative and Visual
[9] brahim, R, N & Ilham, M, S. (2017). Design of Stegagrip Application with LSB Method Based on RSA Algorithm WEB.
[10] Irvando., Purnama, B., Wijaya, I.S. (2014). Designing of LSB (Least Significant Bit) Technical Steganography in Computer Security.
[11] Jayaram, P., Ranganatha, H, R., Anupama, H, S. (2011). Information Hiding Using Audio Steganography - A Survey.
[12] Juman, K.K. (2008). Steganographic Analysis of Data Security.
[13] Juma’in., Melita, Y. (2011). Image Compression or Image Using Discretecosine Transform.
[14] Jumiran, & Fitri, A. (2014). Insertion of Text In Pictures Using Steganography.
[15] Khan, F., & Gutub, A. A. (n.d.). Message concealment techniques using image based steganography.
[16] Laia, A. (2016). Designing Steganography Learning Applications Using Computer Based Instruction Methods.
[17] Martsanto, S. & Jazuli, W. (2016). Steganography and Document Encryption Techniques to Ensure Information Security and Integrity in Organizational Scope (Case Study at PT Saptawara Teknologi Indonesia).
[18] Nugraha, E.F. (2011) Increasing the Capacity of the Message Inserted by the Redundant Pattern Encoding Method.
[19] Pakereng, M. A. I., Study, P., Informatics, T., Information, F. T., Kristen, U., & Discourse, S. (2016). Design and Implementation of Steganography Using the Redundant Pattern Encoding Method with AES (Advanced Encryption Standard) Algorithm Scientific Article Design and Implementation of Steganography Using the Redundant Pattern Method Encoding with Alg, (672011013).
[20] Pakereng, M. a I., Beeh, Y. R., & Endrawan, S. (2010). Comparison of Steganography Spread Spectrum Method and Least Significant Bit (LSB) Between Processing Time and Image File Size. Spectrum, 6 (1), 68–86.
[21] Saini, G, & Singh, P. (2014). Audio Steganography by LSB Method and Enhanced Security with AES.
[22] Singla, D., & Scarf, R. (2012). Data Security Using LSB & DCT Steganography in Images. International Journal of Computational Engineering Research, 2 (2), 2250–3005.