2017
DOI: 10.26877/jiu.v3i2.1815
|View full text |Cite
|
Sign up to set email alerts
|

Teknik Steganografi dengan Metode Discrete Cosines Transform (DCT) pada Citra Interpolasi Bilinear untuk Pengamanan Pesan

Abstract: Abstract-This study discusses the security of data by inserting messages on a media image or steganography, previous research is still a lot of message insertion in the formAbstrak-Penelitian ini membahas tentang keamanan data dengan penyisipan pesan pada suatu media gambar atau steganografi, penelitian sebelumnya masih banyak penyisipan pesan berupa text kalimat saja dan beberapa menggunakan file berformat txt. Penelitian saat ini isi pesan dapat berupa beberapa file penting yang memiliki format extension ber… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
2

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 1 publication
(2 reference statements)
0
3
0
2
Order By: Relevance
“…The research conducted message insertion in doc / docx files, pdf files, compress RAR files containing sentences, images, and formula formulas with symbols. The test results obtained MSE values of 8.35 dB and PSNR 27.87dB [16]. Another study using cubic b-spline for interpolation in cover images.…”
Section: Introductionmentioning
confidence: 91%
See 2 more Smart Citations
“…The research conducted message insertion in doc / docx files, pdf files, compress RAR files containing sentences, images, and formula formulas with symbols. The test results obtained MSE values of 8.35 dB and PSNR 27.87dB [16]. Another study using cubic b-spline for interpolation in cover images.…”
Section: Introductionmentioning
confidence: 91%
“…The DCT method can be used to insert messages to convert a signal into its basic frequency components. Algorithms and transformations in steganography hide data in mathematical functions [16] [22]. DCT works with a matrix transformation, namely, converting a discrete signal from the time domain into a frequency domain.…”
Section: B Process Steganography Discrete Cosine Transform (Dct)mentioning
confidence: 99%
See 1 more Smart Citation
“…Kemudian setelah optimum range didapat, langkah selanjutnya mencari bit pesan (ti) yang dapat disisipkan melalui persamaan (6).…”
Section: Jiko (Jurnalunclassified
“…Menurut penelitian Khandagele (2015) tentang Comparison of LSB and PVD Steganography Methods dijelaskan bahwa metode PVD lebih baik dibanding LSB [4]. Citra digital dipilih karena pada media yang sudah disisipkan pesan ataupun belum disisipkan pesan mempunyai bentuk visual sama [5], [6]. Sedangkan menurut penelitian Siti Rohayah (2015), penyisipan dan Ekstraksi dapat dilakukan jika ukuran file cover objek lebih besar dibanding file yang disisipkan [7].…”
unclassified