Application of Text File Steganography on Video using Least Bit Significant (LSB) Method

Nabila Mellynda, Yusuf Ramadhan Nasution

Abstract


In the era of rapid development of information technology, data security is a crucial aspect that must be considered. The transfer and storage of information involves various media, including text and video. Unfortunately, most data sent or stored tends to be vulnerable to security threats. The purpose of this research is to implement text file steganography on video using the Least Bit Significant (LSB) method that can be used to hide secret messages. The method used in this research are LSB and Waterfall development method. The results of the study concluded that the LSB algorithm can be used in the process of insertion and extraction of text messages on video, text messages in this study are text contained in a text file with the txt extension. Videos that have been inserted text messages will have an extension of mp4 and cannot be played on video file playback media, The application produced in this study can be run through a web browser application, The application in this study was built using Visual Studio Code software using the HTML and Javascript programming languages.

Full Text:

PDF

References


N. Ratama and M. Munawaroh, “Implementasi Metode Kriptografi dengan Menggunakan Algoritma RC4 dan Steganografi Least Significant Bit Dalam Mengamankan Data Berbasis Android,” J. Media Inform. Budidarma, vol. 6, no. 2, p. 1272, 2022, doi: 10.30865/mib.v6i2.3902.

E. Nirmala, “Penerapan Steganografi File Gambar Menggunakan Metode Least Significant Bit (LSB) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Berbasis Android,” J. Inform. Univ. Pamulang, vol. 5, no. 1, p. 36, 2020, doi: 10.32493/informatika.v5i1.4646.

M. Damrudi and K. J. Aval, “Image steganography using LSB and encrypted message with AES, RSA, DES, 3DES, and blowfish,” Int. J. Eng. Adv. Technol., vol. 8, no. 6 Special Issue 3, pp. 204–208, 2019, doi: 10.35940/ijeat.F1033.0986S319.

R. A. Subong, A. C. Fajardo, and Y. J. Kim, “Adaptive bit rotation and inversion scoring: A novel approach to LSB image steganography,” 2018 IEEE 10th Int. Conf. Humanoid, Nanotechnology, Inf. Technol. Commun. Control. Environ. Manag. HNICEM 2018, pp. 1–6, 2019, doi: 10.1109/HNICEM.2018.8666228.

S. Nur’aini, “Steganografi Pada Digital Image Menggunakan Metode Least Significant Bit Insertion,” Walisongo J. Inf. Technol., vol. 1, no. 1, p. 73, 2019, doi: 10.21580/wjit.2019.1.1.4025.

V. Singhal, “Crypto STEGO Techniques to Secure Data Storage Using DES , DCT , Blowfish and LSB Encryption Algorithms,” vol. 13, no. 3, pp. 1162–1171, 2022.

M. Ali, “a Survey of the Most Current Image Encryption and Decryption Techniques,” Int. J. Adv. Res. Comput. Sci., vol. 10, no. 1, pp. 9–14, 2019, doi: 10.26483/ijarcs.v10i1.6350.

T. Suprapti, T. Hartati, Y. Arie Wijaya, and C. Lukman Rohmat, “Penegembangan Aplikasi Berbasis Web Untuk Peningkatan Layanan Usaha Loundry,” J. Sist. Inf. dan Teknol. Informasi), vol. 4, no. 2, pp. 73–82, 2022.

V. I. Z. Hadi, “Steganografi pada Video Digital Menggunakan Metode 2LSB,” 2018.

A. Hafiz, “Steganografi Berbasis Citra Digital Untuk Menyembunyikan Data Menggunakanmetodeleast Significant Bit(Lsb),” Bandar lampung, vol. XVII, no. April, p. april, 2019.

M. Afsari, D. I. Mulyana, A. Damaiyanti, and N. Sa’adah, “Implementasi Mode Operasi Kombinasi Cipher Block Chaining dan Metode LSB-1 Pada Pengamanan Data text,” J. Pendidik. Sains dan Komput., vol. 2, no. 01, pp. 70–82, 2022, doi: 10.47709/jpsk.v2i01.1381.

G. Wibisono, T. Waluyo, and E. I. H. Ujianto, “Kajian Metode Metode Steganografi Pada Domain Spasial,” JITK (Jurnal Ilmu Pengetah. dan Teknol. Komputer), vol. 5, no. 2, pp. 259–264, 2020, doi: 10.33480/jitk.v5i2.1212.

F. Aditiya, “Implementasi Algoritma Redundant Pattern Encoding Untuk Menyisipkan Pesan Teks Ke Dalam Gambar dan Algoritma Fibonacci Codes Untuk Kompresi,” Bull. Artif. Intell., vol. 1, no. 2, pp. 43–51, 2022.

S. Ardhimasetyo, I. I. Tritoasmoro, and ..., “Steganografi Video Dengan Penyisipan Pesan Rahasia Menggunakan Teks Pada Frame Video Berbasis Ssb-4 Dan Discrete Cosine Transform (dct),” eProceedings …, vol. 6, no. 2, pp. 4819–4826, 2019.

Rita, “Peningkatan Keterampilan,” J. Pendidik. Bhs. dan Sastra Indones., vol. 8, no. 1, pp. 104–115, 2019.

I. I. Teguh, “Pentingnya Memahami Penerapan Privasi Di Era Teknologi Informasi,” J. Teknol. Inf. dan Ilmu Komput., vol. 5, no. 3, p. 305, 2018.

R. Nursyanti, R. Y. R. Alamsyah, and S. Perdana, “Perancangan Aplikasi Berbasis Web Untuk Membantu Pengujian Kualitas Kain Tekstil Otomotif (Studi Kasus Pada Pt. Ateja Multi Industri),” Explor. J. Sist. Inf. dan Telemat., vol. 10, no. 2, 2019, doi: 10.36448/jsit.v10i2.1323.

J. Manajemen et al., “Penerapan Aplikasi Database pada Kegiatan Manajemen Sekolah The Use of Database Applications in School Management Activities,” J. Manaj. Pendidik., vol. 1, no. 2, pp. 157–166, 2019.

M. Romzi, B. Kurniawan, “Pembelajaran Pemrograman Python Dengan Pendekatan Logika Algoritma,” JTIM J. Tek. Inform. Mahakarya, vol. 03, no. 2, pp. 37–44, 2020.

H. D. Benington, ''Metode Waterfall Pengertian, Tahapan, Kekurangan dan Kelebihan'', 1956.




DOI: https://doi.org/10.32520/stmsi.v13i2.3933

Article Metrics

Abstract view : 511 times
PDF - 317 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.