Perbandingan Penggunaan Bit Steganografi Metode Least Significant Bit (LSB) M-Bit Pada Citra Digital

Authors

  • Safrina Amini Universitas Budi Luhur
  • Mardi Hardjianto Universitas Budi Luhur
  • Dewi Kusumaningsih Universitas Budi Luhur

DOI:

https://doi.org/10.70309/ticom.v13i3.157

Keywords:

Steganography, m-bit, domain spasial, LSB, PSNR

Abstract

Steganography is an information hiding technique that aims to maintain confidentiality by inserting secret information into digital media, such as images, audio, or video, without revealing the existence of the message. One of the widely used steganography methods is Least Significant Bit (LSB). The limitation of this method is that the number of messages that can be hidden is very small. This is because if the message is too large, the media containing it will change clearly. This can arouse people's suspicion. The LSB method has several variants, one of which is the m-bit LSB. The value of m indicates the number of bits that can be used to store information in one byte of storage media. In this research, we look for the maximum m value that can be used so that the image that has been inserted with information (stego image) still has good quality. The test results obtained PSNR values ​​for m from one to three are 46.36, 39.87, and 33.31. These results indicate that the image still has good quality. Testing with an m value of 4, produced a PSNR value of 23.23, which means the image has quite good quality. The image quality will look bad if using m values ​​of 5 and 6. The resulting PSNR are 21.17 and 15.46.

References

D. R. I. M. Setiadi, E. H. Rachmawanto, and C. A. Sari, “Secure Image Steganography Algorithm Based on DCT with OTP Encryption,” J. Appl. Intell. Syst., vol. 2, no. 1, pp. 1–11, 2017, doi: 10.33633/jais.v2i1.1330.

A. Setiawan and T. Fatimah, “Implementasi Algoritma Kriptografi Rc4 Untuk Keamanan Database Aplikasi Penggajian Karyawan Berbasis Web Pada Pt. Trans Intra Asia,” Skanika, vol. 4, no. 1, pp. 66–71, 2021, doi: 10.36080/skanika.v4i1.2044.

M. Syahril and H. Jaya, “Aplikasi Steganografi Pengamanan Data Nasabah di Standard Chartered Bank Menggunakan Metode Least Significant Bit dan RC4,” Sensasi, pp. 505–509, 2019, [Online]. Available: http://prosiding.seminar-id.com/index.php/sensasi/issue/archivePage%7C505

A. Aryasanti, R. Ujiandari, M. Hardjianto, and R. Kusumawardani, “Implementasi Keamanan File Menggunakan Metode Kriptografi Base-64 dan Steganografi Least Significant Bit (LSB) Random 2-Bit Berbasis Web,” J. Ticom, vol. 11, pp. 113–118, 2023, [Online]. Available: https://jurnal-ticom.jakarta.aptikom.or.id/index.php/Ticom/article/view/78

F. Yanti and K. Budayawan, “Implementasi Steganografi Menggunakan Metode Least Significant Bit (LSB) dalam Pengamanan Informasi pada Citra Digital,” Voteteknika (Vocational Tek. Elektron. dan Inform., vol. 11, no. 1, p. 63, 2023, doi: 10.24036/voteteknika.v11i1.121968.

V. Veriarinal, and R. Wanandi, “Implementasi Sistem Steganografi Citra Dengan Metode Substitusi LSB (Least Significant Bit),” J. Multidisiplin Saintek, vol. 2, no. 11, pp. 5–24, 2024, https://doi.org/10.3785/kohesi.v2i11.2674.

A. R. Mido, E. Iman, and H. Ujianto, “Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan Steganografi LSB,” J. Teknol. Inf. dan Ilmu Komput., vol. 9, no. 2, pp. 279–286, 2022, doi: 10.25126/jtiik.202294852.

D. Susanti, “Analisis Modifikasi Metode Playfair Cipher Dalam Pengamanan Data Teks,” Indones. J. Data Sci., vol. 1, no. 1, pp. 11–18, 2020, doi: 10.33096/ijodas.v1i1.4.

A. I. Auliyah, “Implementasi Kombinasi Algoritma Enkripsi Rivest Shamir Adleman (Rsa) dan Algoritma Kompresi Huffman Pada File Document,” Indones. J. Data Sci., vol. 1, no. 1, pp. 23–28, 2020, doi: 10.33096/ijodas.v1i1.6.

Y. P. Dewi, “Pengembangan Teknik Steganografi dengan Kriptografi Modifikasi dari Caesar Cipher dan SHA-256 untuk Merahasiakan Pesan,” J. Ilmu Komput. dan Desain Komun. Vis., vol. 5, no. 1, pp. 10–21, 2020.

E. Fitri Jayanti, W. Wamiliana, and R. Andrian, “Implementasi Kriptografi Dan Steganografi Pada Media Gambar Menggunakan Hill Cipher Dan Least Significant Bit (LSB),” J. Komputasi, vol. 5, no. 1, pp. 17–23, 2017, doi: 10.23960/komputasi.v5i1.1411.

C. Irawan, D. R. I. M. Setiadi, C. A. Sari, and E. H. Rachmawanto, “Hiding and Securing Message on Edge Areas of Image Using LSB Steganography and OTP Encryption,” in 1st International Conference on Informatics and Coputational Sciences (ICICoS), Semarang, 2017.

M. L. Aksani, L. Azhari, and F. E. Nugroho, “Studi Dan Implementasi Steganografi Pada Citra PNG Dengan Metode Least-Significant Bit (LSB) Mengunakan Java,” vol. 14, no. 01, pp. 39–44, 2025, http://dx.doi.org/10.31000/jt.v14i1.13643.

E. Nirmala, “Penerapan Steganografi File Gambar Menggunakan Metode Least Significant Bit (LSB) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Berbasis Android,” J. Inform. Univ. Pamulang, vol. 5, no. 1, pp. 36–47, 2020, https://doi.org/10.32493/informatika.v5i1.4646.

P. Kusuma and Y. Prayudi, “Implementasi Steganografi Dengan Menggunakan Metode Masking and Filtering Untuk Menyisipkan Pesan Ke Dalam Spectrogram Audio,” Ajie - Asian Journal Innovation Entrepreneurship, vol. 9, no. 1, pp. 1–15, 2025, doi: 10.20885/ajie.vol9.iss1.art1.

S. Sharma and U. Kumar, “Review of Transform Domain Techniques for Image Steganography,” Int. J. Sci. Res., vol. 4, no. April 2013, pp. 2319–7064, 2013, doi: 10.13140/RG.2.1.4797.1928.

A. I. Zakaria, E. Ernawati, A. Vatresia, and W. K. Oktoeberza, “Perbandingan Metode High-Frequency Emphasis (HFE) Dan Contrast Limited Adaptive Histogram Equalization (CLAHE) Dalam Perbaikan Kualitas Citra Penginderaan Jauh (Remote Sensing),” Pseudocode, vol. 6, no. 2, pp. 125–137, 2019, doi: 10.33369/pseudocode.6.2.125-137.

Downloads

Published

31-05-2025

How to Cite

Amini, S., Hardjianto, M., & Dewi Kusumaningsih. (2025). Perbandingan Penggunaan Bit Steganografi Metode Least Significant Bit (LSB) M-Bit Pada Citra Digital. Jurnal Ticom: Technology of Information and Communication, 13(3), 129–134. https://doi.org/10.70309/ticom.v13i3.157