Program Studi Sistem Komputer, Universitas Diponegoro, Indonesia
BibTex Citation Data :
@article{JTSISKOM12782, author = {Alim Muadzani and Oky Dwi Nurhayati and Ike Pertiwi Windasari}, title = {Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital}, journal = {Jurnal Teknologi dan Sistem Komputer}, volume = {4}, number = {3}, year = {2016}, keywords = {C#; Least Significant Bit; Steganography; image processing; JTSiskom}, abstract = {Information has now become an important comodity in human life, with the rapid development of communications technology has enable people to communicate and exchange information more easily. Internet is very popular and used by billions users worldwide, the information passing through the internet is very large, and some certain people trying to get this information for profit. The information need to be secured to prevent the others to get the information that send through the internet, steganography can be used to hide the information before sending it and the receiver can recover the hidden data. Digital steganography using computer can use a variety of digital file, digital image file is one of them. With the infomation being hidden inside the image-carrier, the others will not aware about the hidden information. Application created using C# programming leanguage and the steganoraphy method using Least Significant Bit Insertion (LSBI). Microsoft Visual Studio used as Integrated Development Environtment (IDE) to code and design the user interface. Software develpment model using Extreme Programming, and the testing using black box method. Application designed to hide text or image inside an image-carrier and the hidden text or image can be recovered. The result of this research are an application that can hide text or image into image-carrier, and the hidden text or image can be recovered. Based on the testing application can run as expected and fulfill all the requirements. }, issn = {2338-0403}, pages = {470--478} doi = {10.14710/jtsiskom.4.3.2016.470-478}, url = {https://jtsiskom.undip.ac.id/article/view/12782} }
Refworks Citation Data :
Note: This article has supplementary file(s).
Article Metrics:
Last update:
Analysis of Modified Least Significant Bit Polynomial Function Algorithm For Securing Digital Image
Last update: 2024-12-26 14:17:11
Starting from 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JTSiskom will not be held responsible for anything arising because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.