Implementasi Steganografi Menggunakan Metode Least Significant Bit dan Kriptografi Advanced Encryption Standard
Nowadays, the development of celluler device especially mobile phone is very rapid. The security of information in mobile phone becoming such an important thing, because users do not want other people can access their essential information. It means in the security in mobile phone. One way to secure the data is steganograpgy technique. This technique hides the data in a digital media. In this research the steganography technique that the is used is the Least Significant Bit (LSB) which implemented to cellular equipment with android as the operating system. The digital image which is used to hide the data is PNG. The test result shows that steganography has been implemented successfully in android phone. In the imprecebility aspect, user cannot different between the picture with message and the original picture bare eyedly. In recovery aspect, the message successfully encrypted and decrypted without changing the original content of the message. The lack occurs in fidelity aspect which the expansion of PNG file happens.
Index Terms—LSB, least significant bit, png, android, handphone
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike International License (CC-BY-SA 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Copyright without Restrictions
The journal allows the author(s) to hold the copyright without restrictions and will retain publishing rights without restrictions.
The submitted papers are assumed to contain no proprietary material unprotected by patent or patent application; responsibility for technical content and for protection of proprietary material rests solely with the author(s) and their organizations and is not the responsibility of the ULTIMATICS or its Editorial Staff. The main (first/corresponding) author is responsible for ensuring that the article has been seen and approved by all the other authors. It is the responsibility of the author to obtain all necessary copyright release permissions for the use of any copyrighted materials in the manuscript prior to the submission.