Implementasi Steganografi untuk Keamanan Jaringan Teknik Tersembunyi dalam Komunikasi Data
DOI:
https://doi.org/10.71282/jurmie.v2i10.1093Keywords:
Steganography, Network Security, Data Communication.Abstract
In the current digital era, where data threats are increasingly sophisticated and varied, network security measures such as steganography are essential. Steganography is a method used to conceal information within other media, such as images, audio, or video, so that the existence of the information is not detected by unauthorized parties. This method aims to maintain the confidentiality of the embedded message, ensuring that only the sender and the recipient are aware of its content. This research employs a literature study involving the collection of data from various sources, reading, noting, and processing the research materials. The results indicate that the implemented steganography method successfully embeds data with a low detection rate by third parties while maintaining good image quality. However, performance varies depending on the format and size of the digital media used. Overall, the implemented steganography method has proven effective in concealing sensitive data within digital media without compromising the quality of the media.
Downloads
References
[1] Mohammad Imron and Aditiya Pratama, “InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan,” vol. 6, no. 2, 2022, doi: 10.30743/infotekjar.v6i2.4346.
[2] A. Giawa, B. Nadeak, and R. K. Hondro, “IMPLEMENTASI STEGANOGRAFI DENGAN METODE LEAST SIGNIFICANT BIT UNTUK KEAMANAN DATA PESAN TEKS MENGGUNAKANALGORITMA ONE TIME PAD,” Jurnal Pelita Informatika, vol. 6, no. 4, 2018.
[3] M. Yusron Rafi and P. Rosyani, “KEAMANAN DATA MENGGUNAKAN TEKNIK STEGANOGRAFI DENGAN METODE END OF FILE (EOF),” 2023. [Online]. Available: http://ojsamik.amikmitragama.ac.id
[4] T. Sinta Peringkat et al., “APLIKASI KEAMANAN DOCUMENT DIGITAL MENGGUNAKAN ALGORITMA STEGANOGRAFI DISCRETE COSINE TRANSFORM (DCT) PADA PERUSAHAN ALAT BERAT,” vol. 5, no. 2, 2020, [Online]. Available: www.budiluhur.ac.id
[5] L. Ali Fitriani, “(media cetak) Analisa Keamanan Data Teks Dengan Menerapkan Kriptografi RSA dan Steganografi LSB,” Journal of Computer System and Informatics (JoSYC), vol. 1, no. 2, 2020.
[6] R. Fanry Siahaan, P. Marpaung, I. Febrian, and W. Putri, “Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) Analisis Daya Tahan Keamanan Data Pada Steganografi Berbasis Teks Dalam Struktur Kalimat Bahasa Indonesia,” Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer), vol. 22, no. 2, 2023, [Online]. Available: https://ojs.trigunadharma.ac.id/index.php/jis/index
[7] B. : Journal, S. Siaulhak, and S. Kasma, “Siaulhak, Safwan Kasma Sistem Pengiriman File Menggunakan Steganografi Pengolahan Citra Digital Berbasis Matriks Laboratory,” 2023.
[8] Dewi Laksmiati, “IMPLEMENTASI STEGANOGRAFI IMAGE PROCESSING DAN ENKRIPSI AES MENGGUNAKAN OPENSTEGO,” Jurnal AKRAB JUARA, vol. 6, no. 1, pp. 30–40, 2021.
[9] Anggraeni Eka Putri, Aghistina Kartikadewi, and Lina Audina Abdul Rosyid, “Implementasi Kriptografi Dengan Algoritma Advanced Encryption Standard (AES) 128 Bit Dan Steganografi Menggunakan Metode End Of File (EOF) Berbasis Java Desktop Pada Dinas Pendidikan Kabupaten Tangerang,” vol. 3, no. 2, 2020.
[10] Hermansa, Rusydi Umar, and Anton Yudhana, “Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra,” Jurnal Sains Komputer & Informatika (J-SAKTI), vol. 4, no. 1, 2020.
[11] B. : Journal, S. Siaulhak, and S. Kasma, “Siaulhak, Safwan Kasma Sistem Pengiriman File Menggunakan Steganografi Pengolahan Citra Digital Berbasis Matriks Laboratory,” 2023.
[12] D. Anggara and A. S. Sembiring, “PENINGKATAN KEAMANAN DATA TEKS TERENKRIPSI ALGORITMA LUCIFER MENGGUNAKAN STEGANOGRAFI GIFSHUFFLE PADA CITRA,” KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), vol. 3, no. 1, Nov. 2019, doi: 10.30865/komik.v3i1.1626.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Muh Rizky Anggara Yunan Putra, Bintang Putra Aryatama, Nikodemus Christiano David, Gilang Pamungkas, Indrawan Ady Saputro (Author)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.










