Quality Factor terhadap Kapasitas Pesan Rahasia pada Steganografi Citra JPEG dan Kualitas Citra Stego

Main Article Content

Dian Hafidh Zulfikar

Abstract

One of the container media that is available and popular is the Joint Photographic Experts Group (JPEG) format image. This article aims to determine the effect of Quality Factor on the secret message capacity of JPEG image steganography and stego image quality. The quality of an image can actually be seen subjectively with the human eye, but this is relative between each individual. Because the assessment of the human eye varies from person to person. In addition, the effect of Quality Factor on secret message capacity is not yet known whether it has an impact. Therefore, in this study the Quality Factor is used to objectively see the secret message capacity of the JPEG image steganography and the quality of the stego image. The parameter used to determine the quality of an image is the Peak Signal to Noise Ratio (PSNR). PSNR will compare the quality of the original image (before steganography) with the stego image. The test results show that the Q Factor effect can affect the secret message capacity of the JPEG image steganography and the stego image quality. The bigger the Q Factor, the more the message capacity is generated. The greater the Q factor, the better the quality of the resulting stego image.

Article Details

How to Cite
Zulfikar, D. H. (2020). Quality Factor terhadap Kapasitas Pesan Rahasia pada Steganografi Citra JPEG dan Kualitas Citra Stego. JUSIFO (Jurnal Sistem Informasi), 6(2), 89-100. https://doi.org/10.19109/jusifo.v6i2.6608
Section
Articles

How to Cite

Zulfikar, D. H. (2020). Quality Factor terhadap Kapasitas Pesan Rahasia pada Steganografi Citra JPEG dan Kualitas Citra Stego. JUSIFO (Jurnal Sistem Informasi), 6(2), 89-100. https://doi.org/10.19109/jusifo.v6i2.6608

References

Abdel Wahab, O. F., Hussein, A. I., Hamed, H. F. A., Kelash, H. M., Khalaf, A. A. M., & Ali, H. M. (2019). Hiding Data in Images Using Steganography Techniques with Compression Algorithms. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1168–1175. https://doi.org/10.12928/TELKOMNIKA.V17I3.12230

Altaay, A. A. J., Sahib, S. B., & Zamani, M. (2012). An Introduction to Image Steganography Techniques. 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 122–126. https://doi.org/10.1109/ACSAT.2012.25

Andriotis, P., Oikonomou, G., & Tryfonas, T. (2013). JPEG steganography detection with Benford’s Law. Digital Investigation, 9(3), 246–257. https://doi.org/https://doi.org/10.1016/j.diin.2013.01.005

Ansari, A. S., Mohammadi, M. S., & Parvez, M. T. (2020). a Multiple-format Steganography Algorithm for Color Images. IEEE Access, 8, 83926–83939. https://doi.org/10.1109/ACCESS.2020.2991130

Bao, Z., Guo, Y., Li, X., Zhang, Y., Xu, M., & Luo, X. (2020). Correction to : a Robust Image Steganography Based on the Concatenated Error Correction Encoder and Discrete Cosine Transform Coefficients. Journal of Ambient Intelligence and Humanized Computing, 11(5), 1903. https://doi.org/10.1007/s12652-019-01376-1

Battikh, D., El Assad, S., Hoang, T. M., Bakhache, B., Deforges, O., & Khalil, M. (2019). Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors. Entropy, 21(8), 1–36. https://doi.org/10.3390/e21080748

Cogranne, R. (2018). Determining JPEG Image Standard Quality Factor from the Quantization Tables.

Darbani, A., AlyanNezhadi, M. M., & Forghani, M. (2019). A New Steganography Method for Embedding Message in JPEG Images. 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI), 617–621. https://doi.org/10.1109/KBEI.2019.8735054

Darwis, D. (2017). Teknik Steganografi untuk Penyembunyian Pesan Teks Menggunakan Algoritma GIFSHUFFLE. Jurnal Teknoinfo, 11(1), 19. https://doi.org/10.33365/jti.v11i1.6

Gunawan, C. E., & Fenando, F. (2018). Pengukuran Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) Studi Kasus di PUSTIPD UIN Raden Fatah Palembang. JUSIFO (Jurnal Sistem Informasi), 4(2), 121–132. https://doi.org/10.19109/JUSIFO.V4I2.4107

Hamzah, R. F., Jaya, I. D., & Putri, U. M. (2020). Analisis Risiko Keamanan Sistem Informasi E-LKP Dengan Metode Octave Pada Perguruan Tinggi Negeri X. Jusifo, 6(1), 55–65. https://doi.org/10.19109/jusifo.v6i1.5880

Jóokay, M., & Moravčík, T. (2010). Image-based JPEG Steganography. Tatra Mountains Mathematical Publications, 45(1), 65–74. https://doi.org/10.2478/v10127-010-0006-9

Kim, C., Shin, D., Yang, C.-N., Chen, Y.-C., & Wu, S.-Y. (2019). Data Hiding Using Sequential Hamming + K with M Overlapped Pixels. KSII Transactions on Internet and Information Systems, 13(12), 6159–6174. https://doi.org/10.3837/tiis.2019.12.020

Krasmala, R., Purba, A. B., & Lenggana, U. T. (2017). Kompresi Citra dengan Menggabungkan Metode Discrete Cosine Transform (DCT) dan Algoritma Huffman. JOIN, 2(1), 1–9.

Malathi, P., Abhijeet Sridhar, M., Paliwal, A., & Gireesh Kumar, T. (2020). ScienceDirect ScienceDirect ScienceDirect Maximizing the Embedding Efficiency Using Linear Block Codes Spatial and Transform Domains Maximizing the in Embedding Efficiency Using Linear Block Codes in Spatial and Domains M Transform. Procedia Computer Science, 167, 302–312. https://doi.org/10.1016/j.procs.2020.03.227

Mythili, T., Sofiabanu, A., Mohanasundari, R., & Sreekanth, K. (2019). Data Hiding with Image and Audio Steganography Cryptosystem in Network. International Journal of Recent Trends in Engineering & Research, 5(2), 5–10.

Nur’aini, S. (2019). Steganografi pada Digital Image Menggunakan Metode Least Significant Bit Insertion. Walisongo Journal of Information Technology, 1(1), 75–90. https://doi.org/10.21580/wjit.2019.1.1.4025

Pandit, R., Khosla, N., Singh, G., & Sharma, H. (2013). Image Compression and Quality Factor in case of JPEG Image format. International Journal of Advanced Research in Computer and Communication Engineering, 2(7), 2578–2581.

Singh, B. (2017). Image Steganography Using DWT and Semi Hexadecimal Code Based on PSNR. International Journal of Emerging Research in Management and Technology, 6(8), 230–234. https://doi.org/10.23956/ijermt.v6i8.144

w3techs.com. (2020). Usage Statistics of Image File Formats for Websites, December 2020. https://w3techs.com/technologies/overview/image_format

Zulfikar, D. H., & Harjoko, A. (2016). Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement. IJCCS (Indonesian Journal of Computing and Cybernetics Systems), 10(1), 35. https://doi.org/10.22146/ijccs.11187