Penyisipan Gambar Pada File Video Menerapkan Metode Two Sided Side Match
Abstract
When entering a message into the message container it often leaks the message. Like the insertion of images in video files, there are often leaks of inserted image messages caused by irresponsible parties or intentionally leaking the messages contained. As a result, the message to be sent will change or the message to be sent cannot be sent because these people deliberately leaked the contents of the message sent. Insertion using the Two Sided Side Match method allows the secret message to be sent to be more secure, because this method uses two neighboring pixel values to be able to predict how many messages will be inserted in a pixel. So that the insertion can be done in such a way and the image files that are inserted in the video cannot be hacked by irresponsible people. This research can produce security applications and image insertion data can be secured without containing suspicion so that data leaks do not occur
Downloads
References
Andika, D., & Darwis, D. (2020). Modifikasi Algoritma Gifshuffle Untuk Peningkatan Kualitas Citra Pada Steganografi. Jurnal Ilmiah Infrastruktur Teknologi Informasi, 1(2), 19–23.
Azarianpour, S., & Sadri, A. R. (2019). A generalized ghost detection and segmentation method for double-joint photographic experts group compression. Journal of Medical Signals and Sensors, 9(4), 211.
Bross, B., Chen, J., Ohm, J.-R., Sullivan, G. J., & Wang, Y.-K. (2021). Developments in international video coding standardization after avc, with an overview of versatile video coding (vvc). Proceedings of the IEEE, 109(9), 1463–1493.
Darwis, D., & Pasaribu, A. F. O. (2020). Komparasi Metode Dwt Dan Svd Untuk Mengukur Kualitas Citra Steganografi. Network Engineering Research Operation, 5(2), 100–108.
Hafiz, A. (2019). Steganografi Berbasis Citra Digital Untuk Menyembunyikan Data Menggunakan Metode Least Significant Bit (LSB). Jurnal Cendikia, 17(1 April), 194–198.
Ii, B. A. B. (2001). Universitas Sumatera Utara 6. 1(2), 6–38.
Khairina, N. (2016). Analisis Steganografi Metode Two Sided Side Match. CESS (Journal of Computer Engineering, System and Science), 1(2), 7–11.
Kusrini, 2006:25. (2012). Issn 2252-9063. Universitas Stuttgart, 1(5), 444–456.
Manullang, D. E. P. (2019). Penyisipan Pesan Ke Dalam File Video Menerapkan Metode Chinese Remainder Theorem. KOMIK (Konferensi Nasional Teknologi Informasi Dan Komputer), 3(1), 108–117. https://doi.org/10.30865/komik.v3i1.1576
Pamungkas, N. B., Darwis, D., Nurjayanti, D., & Prastowo, A. T. (2020). Perbandingan Algoritma Pixel Value Differencing dan Modulus Function pada Steganografi untuk Mengukur Kualitas Citra dan Kapasitas Penyimpanan. Jurnal Informatika, 20(1), 67–77.
Ratnasari, A. P., & Dwiyanto, F. A. (2020). Metode Steganografi Citra Digital. Sains, Aplikasi, Komputasi Dan Teknologi Informasi, 2(2), 52–56.
Rulin, R. (2007). PERANCANGAN PROGRAM APLIKASI SEKURITI SOAL UJIAN MENGGUNAKAN TWO-SIDED SIDE MATCH PADA CITRA DIGITAL STUDI KASUS: FMIPA UNIVERSITAS BINA NUSANTARA. BINUS.
Swain, G., & Lenka, S. K. (2013). Steganography using two sided, three sided, and four sided side match methods. CSI Transactions on ICT, 1(2), 127–133.
Tarigan, R. S., & Dwiatma, G. (2022). ANALISA STEGANOGRAFI DENGAN METODE BPCS (Bit-Plane Complexity Segmentation) DAN LSB (Least Significant Bit) PADA PENGOLAHAN CITRA.
Winanti, W. (2009). Penyembunyian Pesan pada Citra Terkompresi JPEG Menggunakan Metode Spread Spectrum. Communications, 13505017.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Penyisipan Gambar Pada File Video Menerapkan Metode Two Sided Side Match
Pages: 35-41
Copyright (c) 2022 Ledi Firman Zendrato

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).