DOI: https://doi.org/10.14710/jtsiskom.2021.13931

Alternatif Otentikasi Menggunakan Metode Steganografi Histogram Shifting

Authentication Alternative Using Histogram Shifting Steganography Method

*Irsandy Maulana Satya Viddin, Antonius Cahya Prihandoko, Diksy Media Firmansyah | Detail
*Irsandy Maulana Satya Viddin  -  Faculty of Computer Science, University of Jember, Indonesia
Antonius Cahya Prihandoko orcid scopus  -  Faculty of Computer Science, University of Jember, Indonesia
Diksy Media Firmansyah scopus  -  Faculty of Computer Science, University of Jember, Indonesia
Received: 29 Sep 2020; Revised: 24 Jan 2021; Accepted: 26 Feb 2021; Published: 30 Apr 2021; Available online: 20 Apr 2021.
Fulltext
Open Access Copyright (c) 2021 Jurnal Teknologi dan Sistem Komputer under http://creativecommons.org/licenses/by-sa/4.0.

Citation Format:
Abstract
This study aims to develop an alternative authentication by applying the Histogram Shifting steganography method. The media used in this research is image. Histogram Shifting is a steganographic method that uses the histogram of an image to insert secret messages. The developed autentiaction alternative applies the Histogram Shifting method to insert user credentials into the carrier image. The resulting steganographic image can then be used to log into the user account by extracting the credentials from the image during the log-in process. The PSNR test of stego image resulted in an average value of 52.52 dB. The extraction capability test shows that all test images can be extracted correctly. Also, this autentiaction method is more resistant againts common attacks on password-based authentication.
Keywords: Authentication; Steganography; Histogram Shifting

Article Metrics:

  1. S. W. Shah and S. S. Kanhere, “Recent Trends in User Authentication – A Survey,” IEEE Access, vol. 7, no. 1, pp. 112505–112519, 2019, doi: 10.1109/ACCESS.2019.2932400
  2. S. Zulkarnain, S. Idrus, E. Cherrier, C. Rosenberger, and J.-J. Schwartzmann, “A Review on Authentication Methods Adaptive biometrics View project Biblio View project,” Australian Journal of Basic and Applied Sciences, vol. 7, no. 5, pp. 95–107, 2013, [Online]. Available: https://www.researchgate.net/publication/281109747
  3. R. Wash, E. Rader, R. Berman, and Z. Wellmer, “Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites,” in Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), Jun. 2016, pp. 175–188, [Online]. Available: https://www.usenix.org/conference/soups2016/technical-sessions/presentation/wash
  4. D. Florencio and C. Herley, “A large-scale study of web password habits,” in Proceedings of the 16th international conference on World Wide Web - WWW ’07, 2007, pp. 657–666, doi: 10.1145/1242572.1242661
  5. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography 2nd Edition, 2nd ed. Morgan Kaufmann, 2008
  6. S. Darmawan and Imelda, “Pengamanan Dokumen Menggunakan Kriptografi RC4 dan Steganografi EOF dengan Media Video MP4 pada CV. Synergy Selaras,” Jurnal Teknologi Elektro, vol. 8, no. 2, pp. 117–122, 2017, doi: 10.22441/jte.v8i2.1606
  7. Y. Nurdiansyah and A. L. F. Riftana, “Implementasi Steganografi Citra Digital Pemberkasan Arsip Menggunakan Metode Least Significant Bit,” in Seminar Nasional Informatika dan Aplikasinya (SNIA), Sep. 2017, vol. 3, pp. 2–7, Accessed: Oct. 22, 2020. [Online]. Available: http://snia.unjani.ac.id/web/index.php/snia/article/view/81
  8. M. K. Ridwan, W. F. Pattipeilohy, and S. Sanwani, “APLIKASI KEAMANAN DOCUMENT DIGITAL MENGGUNAKAN ALGORITMA STEGANOGRAFI DISCRETE COSINE TRANSFORM (DCT) PADA PERUSAHAN ALAT BERAT,” JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer), vol. 5, no. 2, pp. 177–182, Feb. 2020, doi: 10.33480/jitk.v5i2.1033
  9. M. Syahril and H. jaya, “Aplikasi Steganografi Pengamanan Data Nasabah di Standard Chartered Bank Menggunakan Metode Least Significant Bit dan RC4,” in Seminar Nasional Sains dan Teknologi Informasi (SENSASI), Jul. 2019, pp. 505–509
  10. M. Fikri and Guntoro, “Perancangan Aplikasi Single Sign-On (SSO) Menggunakan Otentikasi Gambar,” Jurnal Teknologi Informasi & Komunikasi Digital Zone, vol. 9, no. 1, pp. 12–21, 2018, doi: 10.31849/digitalzone.v9i1.648
  11. E. S. I. Harba, “Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography,” IRAQI JOURNAL OF SCIENCE, vol. 59, no. 1C, pp. 600–606, Apr. 2018, doi: 10.24996/ijs.2018.59.1C.17
  12. S. K. Sonker, S. Kumar, A. Kumar, and P. Singh, “Image Based Authentication Using Steganography Technique,” International Journal of Advanced Research in Computer Science, vol. 4, no. 8, pp. 277–282, 2013
  13. Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–361, Mar. 2006, doi: 10.1109/TCSVT.2006.869964
  14. P. N. Andono, T. Sutojo, and M. Muljono, Pengolahan Citra Digital. 2017
  15. A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, Mar. 2010, doi: 10.1016/j.sigpro.2009.08.010
  16. X. Zhou, W. Gong, W. Fu, and L. Jin, “An improved method for LSB based color image steganography combined with cryptography,” in 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), Jun. 2016, pp. 1–4, doi: 10.1109/ICIS.2016.7550955
  17. D. Gupta and M. Ahmad, “An Efficient Method to Get Improved Peak Signal to Noise Ratio (PSNR), Using Support Vector Machine,” International Journal of Emerging Technology and Advanced Engineering, vol. 7, no. 9, pp. 49–53, 2017

Last update: 2021-05-05 20:45:56

No citation recorded.

Last update: 2021-05-05 20:45:57

No citation recorded.