Implementation of the Least Significant Bit Method for Hiding Text in Digital Images

Authors

  • Harmoko Lubis AMIK Medicom
  • Jontinus Manullang AMIK Medicom

DOI:

https://doi.org/10.35335/jict.v11i1.2

Keywords:

Least Significant Bit, Digital Image, Secret, Steganograph

Abstract

To speed up the process of sending secret messages, we need a medium for small messages that can still guarantee the confidentiality of the messages they contain. GIF (Graphics Interchange Format) is an image format that is one of the most commonly used formats on the web because of its small size and for encrypting the text that is sent. Encryption is carried out at the time of delivery by converting the original data into confidential data, while decryption is carried out at the time of receipt by converting the confidential data into original data. The most common way to hide messages is to use the Least Significant Bit (LSB). This research has succeeded in implementing the LSB algorithm to solve steganography on digital images in GIF format optimally

References

Al Fattah, hanif. 2007. Analisis & Perancangan Sistem Informasi. Yogyakarta: Andi.

Nurdiana, Dian, and Andri Suryadi. "Perancangan Game Budayaku Indonesiaku Menggunakan Metode MDLC." Jurnal Petik 3.2 (2017): 39-44.

Suryadi, Andri. "Perancangan Aplikasi Game Edukasi Menggunakan Model Waterfall." Jurnal Petik 3.1 (2017): 8-13.

Sutabri, Tata. 2012. Analisa Sistem Informasi. Yogyakarta: Andi.

Andi, 2010. Microsoft Visual Basic 6.0 & Crystal Report 2008.Yogyakarta : Madcoms.

Andi, 2011.Tutorial 5 Hari Mahir Menggunakan Pinnacle Studio 14,Semarang : Wahana Komputer.

Andi Offset, 2010. Pengolahan Citra Digital Oleh Darma putra Enterprise Jubilee,2013. Visual Basic 2013 Untuk Pemula.Jakarta : PT.Elex Media Komputindo, 2013.

Downloads

Published

2023-04-30

How to Cite

Lubis, H., & Manullang, J. . (2023). Implementation of the Least Significant Bit Method for Hiding Text in Digital Images. Jurnal ICT : Information and Communication Technologies, 14(1), 1–4. https://doi.org/10.35335/jict.v11i1.2

Most read articles by the same author(s)