Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm
DOI:
https://doi.org/10.30812/matrik.v20i1.701Keywords:
Slantlet Transform, Discrete Cosine Transform, PSNR, MSE, SLT-DCTAbstract
Steganography is an interesting science to be studied and researched at this time, because steganography is the science of hiding messages on other digital media so that other parties are not aware of the existence of information in the digital media. Steganography is very effective in maintaining information security, because the existence of this information is obscured so that it is difficult to know where it is. This paper discusses hiding text into images using the Slantlet Transform (SLT) method, Descreate Cosine Transform (DCT) and Hybrid of SLT and DCT. The three methods are implemented in the frequency domain where steganographic imagery is transformed from the spatial domain to the frequency domain and the message bit is inserted into the cover image frequency component. The comparison parameters of these three techniques are based on MSE, PSNR, Capacity & Robustness. From the results of the tests that have been done, it is obtained that the highest PSNR value is generated using the SLT-DCT method, the largest storage capacity is the SLT method while the resistance, SLT-DCT method and DCT method are more resistant to attack than the SLT method.
Downloads
References
[2] Y. Prayudi and P. Kuncoro, “Implementasi Steganografi Menggunakan Teknik Adaptive Minimum Error Least Significant Bit Replacement ( AMELSBR ),†in Seminar Nasional Aplikasi Teknologi Informasi 2005, 2005, pp. 1–6.
[3] T. Morkel, M. S. Olivier, and S. Africa, “An Overview Of Image Steganography,†in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA 2005), 2005, pp. 1–12.
[4] D. Bansal and R. Chhikara, “An Improved DCT based Steganography Technique,†International Journal of Computer Applications (0975 – 8887), vol. 102, no. 14, pp. 46–49, 2014.
[5] R. Munir, Pengolahan Citra digital dengan Pendekatan Algoritmik. Bandung: Informatika, 2004.
[6] Z. Alqadi, “Comparative Analysis of Color Image Steganography,†International Journal of Computer Science and Mobile Computing, vol. 5, no. 11, pp. 37–43, 2016.
[7] S. Chandran and K. Bhattacharyya, “Performance analysis of LSB, DCT, and DWT for digital watermarking application using steganography,†in 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization, Jan. 2015, vol. 1, pp. 1–5.
[8] P. Vaishali and P. Bhat, “Transform Domain Techniques for Image Steganography,†International Journal Of Innovative Research In Electrical, Electronics, Instrumentation And Control Engineering, vol. 3, no. 1, pp. 65–68, 2015.
[9] H. Arora, C. Bansal, and S. Dagar, “Comparative study of image steganography techniques,†in 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Oct. 2018, vol. 3, no. 4, pp. 982–985.
[10] R. Wissarto, “Implementasi Slantlet Transform (SLT) Dan Huffman Coding Pada Steganografi Citra Grayscale,†2014.
[11] A. A. Faruqi and I. F. Rozi, “Implementasi Steganography Menggunakan Algoritma Discrete Cosine Ttansform,†Jurnal Informatika Polinema, vol. 2, no. 1, p. 35, Mar. 2017.
[12] L. Widyawati, “Penerapan Metode Steganografi SLT dan DCT Pada Citra dengan Contrast Stretching dan Histogram Equalization untuk Meningkatkan Kapasitas Pesan Lilik Widyawati,†2018.
[13] E. S. Wijaya and Y. Prayudi, “Integrasi Metode Steganografi DCS Pada Image Dengan Kriptografi Blowfish Sebagai Model Anti Forensik Untuk Keamanan Ganda Konten Digital,†in Seminar Nasional Aplikasi Teknologi Informasi, 2015, pp. 11–17.
[14] I. Riadi, A. Fadlil, and T. Sari, “Image Forensic for detecting Splicing Image with Distance Function,†International Journal of Computer Applications (0975 – 8887), vol. 169, no. 5, pp. 6–10, 2017.
[15] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,†Signal Processing, vol. 90, no. 3, pp. 727–752, Mar. 2010.
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Danang Wahyu Utomo, Christy Atika Sari, Folasade Olubusola Isinkaye, Quality Improvement for Invisible Watermarking using Singular Value Decomposition and Discrete Cosine Transform , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 3 (2024)
- Mohammad Diqi, Ema Utami, Kusrini Kusrini, Ferry Wahyu Wibowo, Leveraging Vector Quantized Variational Autoencoder for Accurate Synthetic Data Generation in Multivariate Time Series , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 3 (2025)
- Jhon Veri, Surmayanti Surmayanti, Guslendra Guslendra, Prediksi Harga Minyak Mentah Menggunakan Jaringan Syaraf Tiruan , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Agung Teguh Wibowo Almais, Cahyo Crysdian, Khadijah Fahmi Hayati Holle, Akbar Roihan, Smart Assessment menggunakan Backpropagation Neural Network , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Ni Wayan Sumartini Saraswati, Ni Made Lisma Martarini, Extract Transform Loading Data Absensi STMIK STIKOM Indonesia Menggunakan Pentaho , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 2 (2020)
- Relita Buaton, Solikhun Solikhun, Application of Numerical Measure Variations in K-Means Clustering for Grouping Data , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 1 (2023)
- Ach. Khozaimi, Sigit Susanto Putro, Mujibur Rohman, Pengembangan Aplikasi Managemen Tugas Skripsi (Studi Kasus : Program Studi Teknik Informatika Universitas Trunojoyo Madura) , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 2 (2019)
- Bakhtiyar Hadi Prakoso, Implementasi Support Vector Regression pada Prediksi Inflasi Indeks Harga Konsumen , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 1 (2019)
- Anjar Wanto, Ni Luh Wiwik Sri Rahayu Ginantra, Surya Hendraputra, Ika Okta Kirana, Abdi Rahim Damanik, Optimization of Performance Traditional Back-propagation with Cyclical Rule for Forecasting Model , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 1 (2022)
- Gallen cakra adhi wibowo, Sri Yulianto Joko Prasetyo, Irwan Sembiring, Tsunami Vulnerability and Risk Assessment in Banyuwangi District using machine learning and Landsat 8 image data , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- sri suharti, Anton Yudhana, Imam Riadi, Forensik Jaringan DDoS menggunakan Metode ADDIE dan HIDS pada Sistem Operasi Proprietary , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Imam Riadi, Abdul Fadlil, Muhammad Amirul Mu'min, OWASP Framework-based Network Forensics to Analyze the SQLi Attacks on Web Servers , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Imam Riadi, Herman Herman, Fitriah Fitriah, Suprihatin Suprihatin, Optimizing Inventory with Frequent Pattern Growth Algorithm for Small and Medium Enterprises , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 1 (2023)
- Imam Riadi, Herman Herman, Nur Hamida Siregar, Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Yana Safitri, Imam Riadi, Sunardi Sunardi, Mobile Forensic for Body Shaming Investigation Using Association of Chief Police Officers Framework , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Achmad Rian Tarmizi, Ahmat Adil, Lilik Widyawati, Optimization of The use of Wireless Lan Devices to Minimize Operational Costs , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 2 (2020)
- Virdiana Sriviana Fatmawaty, Imam Riadi, Herman Herman, Higher Education Institution Clustering Based on Key Performance Indicators using Quartile Binning Method , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 1 (2024)