Implementation of DCT Based Steganography Algorithm to Hide Information in Images
##plugins.themes.academic_pro.article.main##
Abstract
Steganography is the art and science of hiding secret messages in digital media, ensuring that only the sender and intended recipient are aware of its existence. One of the widely used techniques in digital image steganography is the Discrete Cosine Transform (DCT) based method, which embeds secret data into the frequency domain of an image. This study explores the application of DCT-based steganography to hide information in an image while maintaining its visual integrity. The research methodology involves transforming the image into DCT coefficients, embedding the secret message into selected high-frequency coefficients, and then applying the Inverse Discrete Cosine Transform (IDCT) to reconstruct the stego image. The quality of the modified image is evaluated using the Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MSE) metrics. The results show that the proposed method effectively hides information while maintaining image quality, as indicated by the high PSNR value and minimal MSE. This study contributes to the field of secure data communication by presenting a reliable and undetectable approach to information hiding.
##plugins.themes.academic_pro.article.details##
References
Berbasis, S., Buatan, K., Ancaman, M., Baso, F., Rais, N. A., Hatima, H., Auralia, P., & Nur, A. (2024a). Terbaru dalam Keamanan Data. 7(3).
Berbasis, S., Buatan, K., Ancaman, M., Baso, F., Rais, N. A., Hatima, H., Auralia, P., & Nur, A. (2024b). Terbaru dalam Keamanan Data. 7(3).
Lutfi, S., & Rosihan, R. (2018). PERBANDINGAN METODE STEGANOGRAFI LSB (LEAST SIGNIFICANT BIT) DAN MSB (MOST SIGNIFICANT BIT) UNTUK MENYEMBUNYIKAN INFORMASI RAHASIA KEDALAM CITRA DIGITAL. JIKO (Jurnal Informatika Dan Komputer), 1(1), 34–42. https://doi.org/10.33387/jiko.v1i1.1169
Marzuki, I. (2011). Graduation Ceremony Period.
Sebagai, D. A., & Satu, S. (n.d.). IMPLEMENTASI VIDEO WATERMARKING DENGAN ALGORITMA KOCH ZHAO MENGGUNAKAN MATLAB TUGAS AKHIR.
Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Teknik penyembunyian data. Jurnal Sistem IBM, 35(3-4), 313–336.
Cox, IJ, Miller, ML, Bloom, JA, Kalker, T., & Hohnholz, J. (2008). Tanda air digital dan steganografi. Morgan Kaufmann.
Fridrich, J. (2009). Steganografi dalam media digital: Prinsip, algoritma, dan aplikasi. Cambridge University Press.
Johnson, NF, & Jajodia, S. (1998). Menjelajahi steganografi: Melihat yang tak terlihat. IEEE Computer, 31(2), 26–34.
Katzenbeisser, S., & Petitcolas, FAP (2000). Teknik penyembunyian informasi untuk steganografi dan tanda air digital. Artech House.
Provos, N., & Honeyman, P. (2003). Sembunyi dan cari: Pengenalan steganografi. Keamanan & Privasi IEEE, 1(3), 32–44.
Tang, Z., Li, Y., Luo, B., & Yang, J. (2017). Steganografi gambar berbasis pembelajaran mendalam: Sebuah tinjauan. Alat dan Aplikasi Multimedia, 77(9), 10437–10457.
Westfeld, A., & Pfitzmann, A. (2000). Serangan pada sistem steganografi. Lokakarya Internasional tentang Penyembunyian Informasi, 61–76.