Penerapan Steganografi Pada Image GIF Menggunakan Metode Ezstego dan Elgamal
Abstract
Security and data confidentiality is one of the important aspects in terms of information exchange. One of the solutions to maintain the security and confidentiality of the steganography process is the message insertion technique for file encryption with electronic cryptography used for Gif image steganography. This study describes the development of steganography that applies the Ezstego algorithm which is used for Gif image steganography. The ezstego algorithm was chosen because it inserts message bits from pixel values. This research produces an application program that aims to prevent safety on Gif images. Gif image is a type of indexed image, the jif format is usually used to store computer graphic images, iconic images, cartoons, logos, animation and natural images. In making this application, the method used is the Eztego Algorithm, because it is very suitable for Gif image steganography which results in the completion of the electronic cryptography process on message insertion. This application is made with Visual Basic 2008 software and the creation of a Gif image steganography application with the process of inserting an encryption message and description is expected to solve this problem.
Downloads
References
Rinaldi Munir,“Eksperimen Steganalisis Dengan Metode Visual Attack Pada Citra Hasil EzStego Berformat GIF,” SNATI, pp. C8–C14, 2016
Arius, D. 2008, Awal Sejarah Kriptografi Didunia, STMIK AMIKOM, Yogyakarta.
Munir, R., 2006, Kriptografi, Informatika, Bandung.
Herman Kabetta, “Analisis Kompleksitas Waktu Algoritma Elgamal Dan Data Encryption Standart.” Teknikom, pp. 13–18, 2017.
Nizirwan Anwar,“Perancangan Steganografi Hidden Message Dengan Metode Least (Significant Bit Insertion (LSB) Berbasis Matlab),” Algoritma, Logika Dan Komputasi, vol. 1, no.1, pp. 25-30, 2018
Yudi Prayudi, Puput Setya Kuncoro,“Implementasi Steganografi Menggunakan Teknik Adaptive Minimum Error Least Signifikant Bit Replace (AMELSBR),” SNATI, pp. G1–G6, 2005
Provos, N., Honeyman, P. (2003). Hide and Seek: An Introduction to Steganography. IEEE ComputerSociety.
Hermawati, Fajar Astuti. 2013. Pengolahan Citra Digital Konsep & Teori. Yogyakarta: ANDI.
Muntasa, A., & Purnomo, M. H. 2010. Konsep Pengolahan Citra Digital dan Ekstraksi fitur. Yogyakarta: Graha Ilmu.
Adi Nugroho, 2009, Rekayasa Perangkat Lunak Menggunakan UML dan Java. Penerbit ANDI : Yogyakarta
Jogiyanto, H.M., 2005, Analisis dan Desain, Andi Offset, Yogyakarta.
Priyanto, Rahmat, 2009, Langsung Bisa Visual Basic.Net 2008 ,Penerbit ANDI, Yogyakarta.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Penerapan Steganografi Pada Image GIF Menggunakan Metode Ezstego dan Elgamal
Pages: 118-122
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).