Steganografi Gambar Menggunakan Metode Least Significant Bit Pada Citra Dengan Operasi XOR Article Swipe
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.47065/bits.v6i1.5262
One way to secure secret messages from other unauthorized parties is steganography. One of the most widely used methods in steganography is Least Significant Bit. This research uses images as cover images and secret images. The image is resized to a resolution of 512x512 pixels, The cover image uses an RGB channel image and the secret image also uses an RGB channel image. In this research, LSB will be combined with triple XOR so that it can increase the security of this message hiding method. Triple XOR is used to provide extra security to images that have a secret image (Stego Image) inserted. In this research, several tests were also carried out, including testing the Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE), for robustness testing it was also carried out by making modifications to the stego image such as resizing, compressing, and adding and reducing contrast. The results of this research's PSNR testing are very good, namely approximately 49 dB and lower MSE. With the PSNR and MSE results, it can be proven that the LSB method has a good level of imperceptibility. In experiments on image resistance to modification, several experimental results show that secret image extraction in the stego image failed to be extracted, and from several experiments such as adding and reducing contrast, image rotation and lossless compression, the image inserted in the stego image was successfully extracted.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.47065/bits.v6i1.5262
- https://ejurnal.seminar-id.com/index.php/bits/article/download/5262/2774
- OA Status
- diamond
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4409612913
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4409612913Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.47065/bits.v6i1.5262Digital Object Identifier
- Title
-
Steganografi Gambar Menggunakan Metode Least Significant Bit Pada Citra Dengan Operasi XORWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-06-23Full publication date if available
- Authors
-
Martin Adha, Febi Yanto, Lestari Handayani, Pizaini PizainiList of authors in order
- Landing page
-
https://doi.org/10.47065/bits.v6i1.5262Publisher landing page
- PDF URL
-
https://ejurnal.seminar-id.com/index.php/bits/article/download/5262/2774Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://ejurnal.seminar-id.com/index.php/bits/article/download/5262/2774Direct OA link when available
- Concepts
-
Computer scienceTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4409612913 |
|---|---|
| doi | https://doi.org/10.47065/bits.v6i1.5262 |
| ids.doi | https://doi.org/10.47065/bits.v6i1.5262 |
| ids.openalex | https://openalex.org/W4409612913 |
| fwci | 0.0 |
| type | article |
| title | Steganografi Gambar Menggunakan Metode Least Significant Bit Pada Citra Dengan Operasi XOR |
| biblio.issue | 1 |
| biblio.volume | 6 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T13674 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9995999932289124 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Computer Science and Engineering |
| topics[1].id | https://openalex.org/T13559 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9894000291824341 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Edcuational Technology Systems |
| topics[2].id | https://openalex.org/T12707 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9865000247955322 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2214 |
| topics[2].subfield.display_name | Media Technology |
| topics[2].display_name | Vehicle License Plate Recognition |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.35009151697158813 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.35009151697158813 |
| keywords[0].display_name | Computer science |
| language | en |
| locations[0].id | doi:10.47065/bits.v6i1.5262 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210226296 |
| locations[0].source.issn | 2684-8910, 2685-3310 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2684-8910 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Building of Informatics Technology and Science (BITS) |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].source.host_organization_lineage | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://ejurnal.seminar-id.com/index.php/bits/article/download/5262/2774 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Building of Informatics, Technology and Science (BITS) |
| locations[0].landing_page_url | https://doi.org/10.47065/bits.v6i1.5262 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5028364185 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Martin Adha |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Martin Adha |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5109366726 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Febi Yanto |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Febi Yanto |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5058032527 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-2668-567X |
| authorships[2].author.display_name | Lestari Handayani |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Lestari Handayani |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5037407377 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-1704-8655 |
| authorships[3].author.display_name | Pizaini Pizaini |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Pizaini Pizaini |
| authorships[3].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ejurnal.seminar-id.com/index.php/bits/article/download/5262/2774 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Steganografi Gambar Menggunakan Metode Least Significant Bit Pada Citra Dengan Operasi XOR |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T13674 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9995999932289124 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Computer Science and Engineering |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2390279801, https://openalex.org/W4391913857, https://openalex.org/W2358668433, https://openalex.org/W4396701345, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W4396696052 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.47065/bits.v6i1.5262 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210226296 |
| best_oa_location.source.issn | 2684-8910, 2685-3310 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2684-8910 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Building of Informatics Technology and Science (BITS) |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.source.host_organization_lineage | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://ejurnal.seminar-id.com/index.php/bits/article/download/5262/2774 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Building of Informatics, Technology and Science (BITS) |
| best_oa_location.landing_page_url | https://doi.org/10.47065/bits.v6i1.5262 |
| primary_location.id | doi:10.47065/bits.v6i1.5262 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210226296 |
| primary_location.source.issn | 2684-8910, 2685-3310 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2684-8910 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Building of Informatics Technology and Science (BITS) |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.source.host_organization_lineage | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://ejurnal.seminar-id.com/index.php/bits/article/download/5262/2774 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Building of Informatics, Technology and Science (BITS) |
| primary_location.landing_page_url | https://doi.org/10.47065/bits.v6i1.5262 |
| publication_date | 2024-06-23 |
| publication_year | 2024 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 40, 97, 182 |
| abstract_inverted_index.49 | 162 |
| abstract_inverted_index.In | 63, 103, 187 |
| abstract_inverted_index.an | 49, 59 |
| abstract_inverted_index.as | 29, 142, 215 |
| abstract_inverted_index.be | 68, 175, 208 |
| abstract_inverted_index.by | 134 |
| abstract_inverted_index.dB | 163 |
| abstract_inverted_index.in | 19, 202, 228 |
| abstract_inverted_index.is | 10, 21, 37, 87 |
| abstract_inverted_index.it | 75, 129, 173 |
| abstract_inverted_index.of | 13, 42, 80, 152, 185 |
| abstract_inverted_index.on | 189 |
| abstract_inverted_index.so | 73 |
| abstract_inverted_index.to | 2, 39, 89, 93, 117, 137, 192, 207 |
| abstract_inverted_index.LSB | 66, 179 |
| abstract_inverted_index.MSE | 171 |
| abstract_inverted_index.One | 0, 12 |
| abstract_inverted_index.RGB | 50, 60 |
| abstract_inverted_index.The | 35, 45, 150 |
| abstract_inverted_index.XOR | 72, 86 |
| abstract_inverted_index.and | 32, 53, 121, 145, 147, 164, 170, 210, 217, 222 |
| abstract_inverted_index.are | 157 |
| abstract_inverted_index.can | 76, 174 |
| abstract_inverted_index.for | 126 |
| abstract_inverted_index.has | 181 |
| abstract_inverted_index.out | 133 |
| abstract_inverted_index.the | 14, 54, 78, 114, 138, 168, 178, 203, 225, 229 |
| abstract_inverted_index.was | 130, 232 |
| abstract_inverted_index.way | 1 |
| abstract_inverted_index.Bit. | 24 |
| abstract_inverted_index.MSE. | 166 |
| abstract_inverted_index.Mean | 122 |
| abstract_inverted_index.PSNR | 155, 169 |
| abstract_inverted_index.Peak | 115 |
| abstract_inverted_index.This | 25 |
| abstract_inverted_index.With | 167 |
| abstract_inverted_index.also | 57, 109, 131 |
| abstract_inverted_index.from | 6, 211 |
| abstract_inverted_index.good | 183 |
| abstract_inverted_index.have | 96 |
| abstract_inverted_index.most | 15 |
| abstract_inverted_index.out, | 111 |
| abstract_inverted_index.show | 197 |
| abstract_inverted_index.such | 141, 214 |
| abstract_inverted_index.that | 74, 95, 177, 198 |
| abstract_inverted_index.this | 64, 81, 104, 153 |
| abstract_inverted_index.used | 17, 88 |
| abstract_inverted_index.uses | 27, 48, 58 |
| abstract_inverted_index.very | 158 |
| abstract_inverted_index.were | 108 |
| abstract_inverted_index.will | 67 |
| abstract_inverted_index.with | 70 |
| abstract_inverted_index.Error | 124 |
| abstract_inverted_index.Least | 22 |
| abstract_inverted_index.Noise | 118 |
| abstract_inverted_index.Ratio | 119 |
| abstract_inverted_index.cover | 30, 46 |
| abstract_inverted_index.extra | 91 |
| abstract_inverted_index.good, | 159 |
| abstract_inverted_index.image | 36, 47, 52, 56, 99, 140, 190, 200, 205, 220, 226, 231 |
| abstract_inverted_index.level | 184 |
| abstract_inverted_index.lower | 165 |
| abstract_inverted_index.other | 7 |
| abstract_inverted_index.stego | 139, 204, 230 |
| abstract_inverted_index.tests | 107 |
| abstract_inverted_index.(MSE), | 125 |
| abstract_inverted_index.(PSNR) | 120 |
| abstract_inverted_index.(Stego | 100 |
| abstract_inverted_index.Image) | 101 |
| abstract_inverted_index.Signal | 116 |
| abstract_inverted_index.Square | 123 |
| abstract_inverted_index.Triple | 85 |
| abstract_inverted_index.adding | 146, 216 |
| abstract_inverted_index.failed | 206 |
| abstract_inverted_index.hiding | 83 |
| abstract_inverted_index.image. | 62 |
| abstract_inverted_index.images | 28, 31, 94 |
| abstract_inverted_index.making | 135 |
| abstract_inverted_index.method | 180 |
| abstract_inverted_index.namely | 160 |
| abstract_inverted_index.proven | 176 |
| abstract_inverted_index.secret | 4, 33, 55, 98, 199 |
| abstract_inverted_index.secure | 3 |
| abstract_inverted_index.triple | 71 |
| abstract_inverted_index.widely | 16 |
| abstract_inverted_index.512x512 | 43 |
| abstract_inverted_index.carried | 110, 132 |
| abstract_inverted_index.channel | 51, 61 |
| abstract_inverted_index.images. | 34 |
| abstract_inverted_index.message | 82 |
| abstract_inverted_index.method. | 84 |
| abstract_inverted_index.methods | 18 |
| abstract_inverted_index.parties | 9 |
| abstract_inverted_index.pixels, | 44 |
| abstract_inverted_index.provide | 90 |
| abstract_inverted_index.resized | 38 |
| abstract_inverted_index.results | 151, 196 |
| abstract_inverted_index.several | 106, 194, 212 |
| abstract_inverted_index.testing | 113, 128, 156 |
| abstract_inverted_index.combined | 69 |
| abstract_inverted_index.increase | 77 |
| abstract_inverted_index.inserted | 227 |
| abstract_inverted_index.lossless | 223 |
| abstract_inverted_index.messages | 5 |
| abstract_inverted_index.reducing | 148, 218 |
| abstract_inverted_index.research | 26 |
| abstract_inverted_index.results, | 172 |
| abstract_inverted_index.rotation | 221 |
| abstract_inverted_index.security | 79, 92 |
| abstract_inverted_index.contrast, | 219 |
| abstract_inverted_index.contrast. | 149 |
| abstract_inverted_index.including | 112 |
| abstract_inverted_index.inserted. | 102 |
| abstract_inverted_index.research, | 65, 105 |
| abstract_inverted_index.resizing, | 143 |
| abstract_inverted_index.extracted, | 209 |
| abstract_inverted_index.extracted. | 234 |
| abstract_inverted_index.extraction | 201 |
| abstract_inverted_index.research's | 154 |
| abstract_inverted_index.resistance | 191 |
| abstract_inverted_index.resolution | 41 |
| abstract_inverted_index.robustness | 127 |
| abstract_inverted_index.Significant | 23 |
| abstract_inverted_index.experiments | 188, 213 |
| abstract_inverted_index.compressing, | 144 |
| abstract_inverted_index.compression, | 224 |
| abstract_inverted_index.experimental | 195 |
| abstract_inverted_index.successfully | 233 |
| abstract_inverted_index.unauthorized | 8 |
| abstract_inverted_index.approximately | 161 |
| abstract_inverted_index.modification, | 193 |
| abstract_inverted_index.modifications | 136 |
| abstract_inverted_index.steganography | 20 |
| abstract_inverted_index.steganography. | 11 |
| abstract_inverted_index.imperceptibility. | 186 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile.value | 0.33268623 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |