Quality Factor terhadap Kapasitas Pesan Rahasia pada Steganografi Citra JPEG dan Kualitas Citra Stego
Main Article Content
Abstract
One of the container media that is available and popular is the Joint Photographic Experts Group (JPEG) format image. This article aims to determine the effect of Quality Factor on the secret message capacity of JPEG image steganography and stego image quality. The quality of an image can actually be seen subjectively with the human eye, but this is relative between each individual. Because the assessment of the human eye varies from person to person. In addition, the effect of Quality Factor on secret message capacity is not yet known whether it has an impact. Therefore, in this study the Quality Factor is used to objectively see the secret message capacity of the JPEG image steganography and the quality of the stego image. The parameter used to determine the quality of an image is the Peak Signal to Noise Ratio (PSNR). PSNR will compare the quality of the original image (before steganography) with the stego image. The test results show that the Q Factor effect can affect the secret message capacity of the JPEG image steganography and the stego image quality. The bigger the Q Factor, the more the message capacity is generated. The greater the Q factor, the better the quality of the resulting stego image.
Article Details
How to Cite
Zulfikar, D. H. (2020). Quality Factor terhadap Kapasitas Pesan Rahasia pada Steganografi Citra JPEG dan Kualitas Citra Stego. JUSIFO (Jurnal Sistem Informasi), 6(2), 89-100. https://doi.org/10.19109/jusifo.v6i2.6608
Section
Articles
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
How to Cite
Zulfikar, D. H. (2020). Quality Factor terhadap Kapasitas Pesan Rahasia pada Steganografi Citra JPEG dan Kualitas Citra Stego. JUSIFO (Jurnal Sistem Informasi), 6(2), 89-100. https://doi.org/10.19109/jusifo.v6i2.6608
References
Abdel Wahab, O. F., Hussein, A. I., Hamed, H. F. A., Kelash, H. M., Khalaf, A. A. M., & Ali, H. M. (2019). Hiding Data in Images Using Steganography Techniques with Compression Algorithms. Telkomnika (Telecommunication Computing Electronics and Control), 17(3), 1168–1175. https://doi.org/10.12928/TELKOMNIKA.V17I3.12230
Altaay, A. A. J., Sahib, S. B., & Zamani, M. (2012). An Introduction to Image Steganography Techniques. 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 122–126. https://doi.org/10.1109/ACSAT.2012.25
Andriotis, P., Oikonomou, G., & Tryfonas, T. (2013). JPEG steganography detection with Benford’s Law. Digital Investigation, 9(3), 246–257. https://doi.org/https://doi.org/10.1016/j.diin.2013.01.005
Ansari, A. S., Mohammadi, M. S., & Parvez, M. T. (2020). a Multiple-format Steganography Algorithm for Color Images. IEEE Access, 8, 83926–83939. https://doi.org/10.1109/ACCESS.2020.2991130
Bao, Z., Guo, Y., Li, X., Zhang, Y., Xu, M., & Luo, X. (2020). Correction to : a Robust Image Steganography Based on the Concatenated Error Correction Encoder and Discrete Cosine Transform Coefficients. Journal of Ambient Intelligence and Humanized Computing, 11(5), 1903. https://doi.org/10.1007/s12652-019-01376-1
Battikh, D., El Assad, S., Hoang, T. M., Bakhache, B., Deforges, O., & Khalil, M. (2019). Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors. Entropy, 21(8), 1–36. https://doi.org/10.3390/e21080748
Cogranne, R. (2018). Determining JPEG Image Standard Quality Factor from the Quantization Tables.
Darbani, A., AlyanNezhadi, M. M., & Forghani, M. (2019). A New Steganography Method for Embedding Message in JPEG Images. 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI), 617–621. https://doi.org/10.1109/KBEI.2019.8735054
Darwis, D. (2017). Teknik Steganografi untuk Penyembunyian Pesan Teks Menggunakan Algoritma GIFSHUFFLE. Jurnal Teknoinfo, 11(1), 19. https://doi.org/10.33365/jti.v11i1.6
Gunawan, C. E., & Fenando, F. (2018). Pengukuran Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) Studi Kasus di PUSTIPD UIN Raden Fatah Palembang. JUSIFO (Jurnal Sistem Informasi), 4(2), 121–132. https://doi.org/10.19109/JUSIFO.V4I2.4107
Hamzah, R. F., Jaya, I. D., & Putri, U. M. (2020). Analisis Risiko Keamanan Sistem Informasi E-LKP Dengan Metode Octave Pada Perguruan Tinggi Negeri X. Jusifo, 6(1), 55–65. https://doi.org/10.19109/jusifo.v6i1.5880
Jóokay, M., & Moravčík, T. (2010). Image-based JPEG Steganography. Tatra Mountains Mathematical Publications, 45(1), 65–74. https://doi.org/10.2478/v10127-010-0006-9
Kim, C., Shin, D., Yang, C.-N., Chen, Y.-C., & Wu, S.-Y. (2019). Data Hiding Using Sequential Hamming + K with M Overlapped Pixels. KSII Transactions on Internet and Information Systems, 13(12), 6159–6174. https://doi.org/10.3837/tiis.2019.12.020
Krasmala, R., Purba, A. B., & Lenggana, U. T. (2017). Kompresi Citra dengan Menggabungkan Metode Discrete Cosine Transform (DCT) dan Algoritma Huffman. JOIN, 2(1), 1–9.
Malathi, P., Abhijeet Sridhar, M., Paliwal, A., & Gireesh Kumar, T. (2020). ScienceDirect ScienceDirect ScienceDirect Maximizing the Embedding Efficiency Using Linear Block Codes Spatial and Transform Domains Maximizing the in Embedding Efficiency Using Linear Block Codes in Spatial and Domains M Transform. Procedia Computer Science, 167, 302–312. https://doi.org/10.1016/j.procs.2020.03.227
Mythili, T., Sofiabanu, A., Mohanasundari, R., & Sreekanth, K. (2019). Data Hiding with Image and Audio Steganography Cryptosystem in Network. International Journal of Recent Trends in Engineering & Research, 5(2), 5–10.
Nur’aini, S. (2019). Steganografi pada Digital Image Menggunakan Metode Least Significant Bit Insertion. Walisongo Journal of Information Technology, 1(1), 75–90. https://doi.org/10.21580/wjit.2019.1.1.4025
Pandit, R., Khosla, N., Singh, G., & Sharma, H. (2013). Image Compression and Quality Factor in case of JPEG Image format. International Journal of Advanced Research in Computer and Communication Engineering, 2(7), 2578–2581.
Singh, B. (2017). Image Steganography Using DWT and Semi Hexadecimal Code Based on PSNR. International Journal of Emerging Research in Management and Technology, 6(8), 230–234. https://doi.org/10.23956/ijermt.v6i8.144
w3techs.com. (2020). Usage Statistics of Image File Formats for Websites, December 2020. https://w3techs.com/technologies/overview/image_format
Zulfikar, D. H., & Harjoko, A. (2016). Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement. IJCCS (Indonesian Journal of Computing and Cybernetics Systems), 10(1), 35. https://doi.org/10.22146/ijccs.11187
Altaay, A. A. J., Sahib, S. B., & Zamani, M. (2012). An Introduction to Image Steganography Techniques. 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 122–126. https://doi.org/10.1109/ACSAT.2012.25
Andriotis, P., Oikonomou, G., & Tryfonas, T. (2013). JPEG steganography detection with Benford’s Law. Digital Investigation, 9(3), 246–257. https://doi.org/https://doi.org/10.1016/j.diin.2013.01.005
Ansari, A. S., Mohammadi, M. S., & Parvez, M. T. (2020). a Multiple-format Steganography Algorithm for Color Images. IEEE Access, 8, 83926–83939. https://doi.org/10.1109/ACCESS.2020.2991130
Bao, Z., Guo, Y., Li, X., Zhang, Y., Xu, M., & Luo, X. (2020). Correction to : a Robust Image Steganography Based on the Concatenated Error Correction Encoder and Discrete Cosine Transform Coefficients. Journal of Ambient Intelligence and Humanized Computing, 11(5), 1903. https://doi.org/10.1007/s12652-019-01376-1
Battikh, D., El Assad, S., Hoang, T. M., Bakhache, B., Deforges, O., & Khalil, M. (2019). Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors. Entropy, 21(8), 1–36. https://doi.org/10.3390/e21080748
Cogranne, R. (2018). Determining JPEG Image Standard Quality Factor from the Quantization Tables.
Darbani, A., AlyanNezhadi, M. M., & Forghani, M. (2019). A New Steganography Method for Embedding Message in JPEG Images. 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI), 617–621. https://doi.org/10.1109/KBEI.2019.8735054
Darwis, D. (2017). Teknik Steganografi untuk Penyembunyian Pesan Teks Menggunakan Algoritma GIFSHUFFLE. Jurnal Teknoinfo, 11(1), 19. https://doi.org/10.33365/jti.v11i1.6
Gunawan, C. E., & Fenando, F. (2018). Pengukuran Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) Studi Kasus di PUSTIPD UIN Raden Fatah Palembang. JUSIFO (Jurnal Sistem Informasi), 4(2), 121–132. https://doi.org/10.19109/JUSIFO.V4I2.4107
Hamzah, R. F., Jaya, I. D., & Putri, U. M. (2020). Analisis Risiko Keamanan Sistem Informasi E-LKP Dengan Metode Octave Pada Perguruan Tinggi Negeri X. Jusifo, 6(1), 55–65. https://doi.org/10.19109/jusifo.v6i1.5880
Jóokay, M., & Moravčík, T. (2010). Image-based JPEG Steganography. Tatra Mountains Mathematical Publications, 45(1), 65–74. https://doi.org/10.2478/v10127-010-0006-9
Kim, C., Shin, D., Yang, C.-N., Chen, Y.-C., & Wu, S.-Y. (2019). Data Hiding Using Sequential Hamming + K with M Overlapped Pixels. KSII Transactions on Internet and Information Systems, 13(12), 6159–6174. https://doi.org/10.3837/tiis.2019.12.020
Krasmala, R., Purba, A. B., & Lenggana, U. T. (2017). Kompresi Citra dengan Menggabungkan Metode Discrete Cosine Transform (DCT) dan Algoritma Huffman. JOIN, 2(1), 1–9.
Malathi, P., Abhijeet Sridhar, M., Paliwal, A., & Gireesh Kumar, T. (2020). ScienceDirect ScienceDirect ScienceDirect Maximizing the Embedding Efficiency Using Linear Block Codes Spatial and Transform Domains Maximizing the in Embedding Efficiency Using Linear Block Codes in Spatial and Domains M Transform. Procedia Computer Science, 167, 302–312. https://doi.org/10.1016/j.procs.2020.03.227
Mythili, T., Sofiabanu, A., Mohanasundari, R., & Sreekanth, K. (2019). Data Hiding with Image and Audio Steganography Cryptosystem in Network. International Journal of Recent Trends in Engineering & Research, 5(2), 5–10.
Nur’aini, S. (2019). Steganografi pada Digital Image Menggunakan Metode Least Significant Bit Insertion. Walisongo Journal of Information Technology, 1(1), 75–90. https://doi.org/10.21580/wjit.2019.1.1.4025
Pandit, R., Khosla, N., Singh, G., & Sharma, H. (2013). Image Compression and Quality Factor in case of JPEG Image format. International Journal of Advanced Research in Computer and Communication Engineering, 2(7), 2578–2581.
Singh, B. (2017). Image Steganography Using DWT and Semi Hexadecimal Code Based on PSNR. International Journal of Emerging Research in Management and Technology, 6(8), 230–234. https://doi.org/10.23956/ijermt.v6i8.144
w3techs.com. (2020). Usage Statistics of Image File Formats for Websites, December 2020. https://w3techs.com/technologies/overview/image_format
Zulfikar, D. H., & Harjoko, A. (2016). Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement. IJCCS (Indonesian Journal of Computing and Cybernetics Systems), 10(1), 35. https://doi.org/10.22146/ijccs.11187