Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm
Abstract
Steganography is an interesting science to be studied and researched at this time, because steganography is the science of hiding messages on other digital media so that other parties are not aware of the existence of information in the digital media. Steganography is very effective in maintaining information security, because the existence of this information is obscured so that it is difficult to know where it is. This paper discusses hiding text into images using the Slantlet Transform (SLT) method, Descreate Cosine Transform (DCT) and Hybrid of SLT and DCT. The three methods are implemented in the frequency domain where steganographic imagery is transformed from the spatial domain to the frequency domain and the message bit is inserted into the cover image frequency component. The comparison parameters of these three techniques are based on MSE, PSNR, Capacity & Robustness. From the results of the tests that have been done, it is obtained that the highest PSNR value is generated using the SLT-DCT method, the largest storage capacity is the SLT method while the resistance, SLT-DCT method and DCT method are more resistant to attack than the SLT method.
Downloads
References
[2] Y. Prayudi and P. Kuncoro, “Implementasi Steganografi Menggunakan Teknik Adaptive Minimum Error Least Significant Bit Replacement ( AMELSBR ),” in Seminar Nasional Aplikasi Teknologi Informasi 2005, 2005, pp. 1–6.
[3] T. Morkel, M. S. Olivier, and S. Africa, “An Overview Of Image Steganography,” in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA 2005), 2005, pp. 1–12.
[4] D. Bansal and R. Chhikara, “An Improved DCT based Steganography Technique,” International Journal of Computer Applications (0975 – 8887), vol. 102, no. 14, pp. 46–49, 2014.
[5] R. Munir, Pengolahan Citra digital dengan Pendekatan Algoritmik. Bandung: Informatika, 2004.
[6] Z. Alqadi, “Comparative Analysis of Color Image Steganography,” International Journal of Computer Science and Mobile Computing, vol. 5, no. 11, pp. 37–43, 2016.
[7] S. Chandran and K. Bhattacharyya, “Performance analysis of LSB, DCT, and DWT for digital watermarking application using steganography,” in 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization, Jan. 2015, vol. 1, pp. 1–5.
[8] P. Vaishali and P. Bhat, “Transform Domain Techniques for Image Steganography,” International Journal Of Innovative Research In Electrical, Electronics, Instrumentation And Control Engineering, vol. 3, no. 1, pp. 65–68, 2015.
[9] H. Arora, C. Bansal, and S. Dagar, “Comparative study of image steganography techniques,” in 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Oct. 2018, vol. 3, no. 4, pp. 982–985.
[10] R. Wissarto, “Implementasi Slantlet Transform (SLT) Dan Huffman Coding Pada Steganografi Citra Grayscale,” 2014.
[11] A. A. Faruqi and I. F. Rozi, “Implementasi Steganography Menggunakan Algoritma Discrete Cosine Ttansform,” Jurnal Informatika Polinema, vol. 2, no. 1, p. 35, Mar. 2017.
[12] L. Widyawati, “Penerapan Metode Steganografi SLT dan DCT Pada Citra dengan Contrast Stretching dan Histogram Equalization untuk Meningkatkan Kapasitas Pesan Lilik Widyawati,” 2018.
[13] E. S. Wijaya and Y. Prayudi, “Integrasi Metode Steganografi DCS Pada Image Dengan Kriptografi Blowfish Sebagai Model Anti Forensik Untuk Keamanan Ganda Konten Digital,” in Seminar Nasional Aplikasi Teknologi Informasi, 2015, pp. 11–17.
[14] I. Riadi, A. Fadlil, and T. Sari, “Image Forensic for detecting Splicing Image with Distance Function,” International Journal of Computer Applications (0975 – 8887), vol. 169, no. 5, pp. 6–10, 2017.
[15] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, Mar. 2010.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.