Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement
Dian Hafidh Zulfikar(1*), Agus Harjoko(2)
(1) 
(2) Jurusan Ilmu Komputer dan Elektronika, FMIPA UGM, Yogyakarta
(*) Corresponding Author
Abstract
Based on test results that have to be got several conclusions that capacity steganographic message on DCT sequential greater than the DCT F5 steganography either before or after application of the application POIE, stego image quality on DCT steganography F5 better than the sequential DCT steganography well before the application POIE and after application of POIE, both F5 and steganography steganography DCT DCT sequential equally resistant to manipulation of stego image.
Keywords
Full Text:
PDFReferences
Morkel, T.,Eloff, J.H.P dan Olivier, M.S., 2005, An Overview of Image Steganography, Proceedings of the Fifth Annual Information SecuritySouth Africa Conference, Vol 2, No 3, June, pp.103-112.
Walia, E., Jain, P. dan Navdeep., 2010, An Analysis of LSB & DCT based Steganography, Global Journal of Computer Science and Technology, Vol 10, Issue 1 (Ver 1.0), 4-8.
Roy,R., Changder,S. Sarkar, A. dan Debnath,N.C, 2013, Evaluating Image Steganography Techniques: Future Research Challenges, Jurnal of IEEE, pp 309-314.
Reddy,V.L., Subramanyam, A., dan Reddy,C.P., 2011, Steganography + JPEG, International Journal of Computer Graphics., Vol. 2, no. 1, pp. 31-42.
Westfeld, A., 2001, F5-A Steganographic Algorithm: High capacity despite better steganalysis, Proc. 4th International Workshop on Information Hiding , Springer, vol. 2137, pp. 289-302.
Rajagopal, G.dan Santhi, K., 2013, Contrast Enhancement Using Bi-Histogram Equalization With Brightness Preservation., International Journal of Computer Trends and Technology (IJCTT), Vol. 4 Issue5–May 2013, pp. 1010-1014.
Sajedi, H dan Jamzad, M., 2012, BSS: Boosted steganography scheme with cover image preprocessing, International Journal of Expert Systems with Applications available at ScienceDirect, pp. 7703-7710.
Sawant, H.K dan Deore, M., 2012, A Comprehensive Review of Image Enhancement Techniques, International Journal of Computer Technology and Electronics Engineering (IJCTEE), pp. 39-44.
Patel,H., dan Dave, P., 2012, Steganography Technique Based on DCT Coefficients , International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 1, Jan-Feb 2012, pp.713-717.
Huang,F., Huang, J., dan Shi,Y.Q., 2012, New Channel Selection Rule for JPEG Steganography, IEEE Transaction On Information Forensics and Security.,, Vol. 7, No. 4, pp. 1181-1191.
Murwantini, S., 2007, Kajian Penyimpanan Data pada Media Citra (Steganografi) menggunakan Metode DCT, Tesis, Program Studi Teknik Elektro UGM,Yogyakarta.
Fridrich, J.,Goljan, M dan Hogea, D., 2002, Steganalysis of JPEG Images Breaking The Algorithm, http://www.ws.binghamton.edu/fridrich/Research/f5.pdf, diakses 13 Januari 2013.
DOI: https://doi.org/10.22146/ijccs.11187
Article Metrics
Abstract views : 3109 | views : 3150Refbacks
- There are currently no refbacks.
Copyright (c) 2016 IJCCS - Indonesian Journal of Computing and Cybernetics Systems
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
View My Stats1