Implementasi Steganografi untuk Keamanan Jaringan Teknik Tersembunyi dalam Komunikasi Data

Authors

  • Muh Rizky Anggara Yunan Putra Prodi Informatika, STMIK Amikom Surakarta Author
  • Bintang Putra Aryatama Prodi Informatika, STMIK Amikom Surakarta Author
  • Nikodemus Christiano David Prodi Informatika, STMIK Amikom Surakarta Author
  • Gilang Pamungkas Prodi Informatika, STMIK Amikom Surakarta Author
  • Indrawan Ady Saputro Prodi Informatika, STMIK Amikom Surakarta Author

DOI:

https://doi.org/10.71282/jurmie.v2i10.1093

Keywords:

Steganography, Network Security, Data Communication.

Abstract

In the current digital era, where data threats are increasingly sophisticated and varied, network security measures such as steganography are essential. Steganography is a method used to conceal information within other media, such as images, audio, or video, so that the existence of the information is not detected by unauthorized parties. This method aims to maintain the confidentiality of the embedded message, ensuring that only the sender and the recipient are aware of its content. This research employs a literature study involving the collection of data from various sources, reading, noting, and processing the research materials. The results indicate that the implemented steganography method successfully embeds data with a low detection rate by third parties while maintaining good image quality. However, performance varies depending on the format and size of the digital media used. Overall, the implemented steganography method has proven effective in concealing sensitive data within digital media without compromising the quality of the media.

Downloads

Download data is not yet available.

References

[1] Mohammad Imron and Aditiya Pratama, “InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan,” vol. 6, no. 2, 2022, doi: 10.30743/infotekjar.v6i2.4346.

[2] A. Giawa, B. Nadeak, and R. K. Hondro, “IMPLEMENTASI STEGANOGRAFI DENGAN METODE LEAST SIGNIFICANT BIT UNTUK KEAMANAN DATA PESAN TEKS MENGGUNAKANALGORITMA ONE TIME PAD,” Jurnal Pelita Informatika, vol. 6, no. 4, 2018.

[3] M. Yusron Rafi and P. Rosyani, “KEAMANAN DATA MENGGUNAKAN TEKNIK STEGANOGRAFI DENGAN METODE END OF FILE (EOF),” 2023. [Online]. Available: http://ojsamik.amikmitragama.ac.id

[4] T. Sinta Peringkat et al., “APLIKASI KEAMANAN DOCUMENT DIGITAL MENGGUNAKAN ALGORITMA STEGANOGRAFI DISCRETE COSINE TRANSFORM (DCT) PADA PERUSAHAN ALAT BERAT,” vol. 5, no. 2, 2020, [Online]. Available: www.budiluhur.ac.id

[5] L. Ali Fitriani, “(media cetak) Analisa Keamanan Data Teks Dengan Menerapkan Kriptografi RSA dan Steganografi LSB,” Journal of Computer System and Informatics (JoSYC), vol. 1, no. 2, 2020.

[6] R. Fanry Siahaan, P. Marpaung, I. Febrian, and W. Putri, “Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) Analisis Daya Tahan Keamanan Data Pada Steganografi Berbasis Teks Dalam Struktur Kalimat Bahasa Indonesia,” Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer), vol. 22, no. 2, 2023, [Online]. Available: https://ojs.trigunadharma.ac.id/index.php/jis/index

[7] B. : Journal, S. Siaulhak, and S. Kasma, “Siaulhak, Safwan Kasma Sistem Pengiriman File Menggunakan Steganografi Pengolahan Citra Digital Berbasis Matriks Laboratory,” 2023.

[8] Dewi Laksmiati, “IMPLEMENTASI STEGANOGRAFI IMAGE PROCESSING DAN ENKRIPSI AES MENGGUNAKAN OPENSTEGO,” Jurnal AKRAB JUARA, vol. 6, no. 1, pp. 30–40, 2021.

[9] Anggraeni Eka Putri, Aghistina Kartikadewi, and Lina Audina Abdul Rosyid, “Implementasi Kriptografi Dengan Algoritma Advanced Encryption Standard (AES) 128 Bit Dan Steganografi Menggunakan Metode End Of File (EOF) Berbasis Java Desktop Pada Dinas Pendidikan Kabupaten Tangerang,” vol. 3, no. 2, 2020.

[10] Hermansa, Rusydi Umar, and Anton Yudhana, “Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra,” Jurnal Sains Komputer & Informatika (J-SAKTI), vol. 4, no. 1, 2020.

[11] B. : Journal, S. Siaulhak, and S. Kasma, “Siaulhak, Safwan Kasma Sistem Pengiriman File Menggunakan Steganografi Pengolahan Citra Digital Berbasis Matriks Laboratory,” 2023.

[12] D. Anggara and A. S. Sembiring, “PENINGKATAN KEAMANAN DATA TEKS TERENKRIPSI ALGORITMA LUCIFER MENGGUNAKAN STEGANOGRAFI GIFSHUFFLE PADA CITRA,” KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), vol. 3, no. 1, Nov. 2019, doi: 10.30865/komik.v3i1.1626.

Downloads

Published

29-10-2025

How to Cite

Implementasi Steganografi untuk Keamanan Jaringan Teknik Tersembunyi dalam Komunikasi Data. (2025). Jurnal Riset Multidisiplin Edukasi, 2(10), 956-963. https://doi.org/10.71282/jurmie.v2i10.1093

Most read articles by the same author(s)

Similar Articles

1-10 of 306

You may also start an advanced similarity search for this article.