Terapan Metode Least Significant Bit untuk Deteksi Keaslian e-Sertifikat

Alusyanti Primawati(1*), Aulia Paramita(2), Akbar Muchbarak(3), Aprilia Sulistyohati(4)

(1) Teknik Informatika,FTIK, Universitas Indraprasta PGRI
(2) Teknik Informatika,FTIK, Universitas Indraprasta PGRI
(3) (Scopus ID: 57205058978) Universitas Indraprasta PGRI
(4) Teknik Informatika,FTIK, Universitas Indraprasta PGRI
(*) Corresponding Author

Abstract


The ease of accessing digital information allows a person to change or manipulate the data contained in the information. Therefore, the security of information or vital data from intruders or unauthorized access is important. One of the cases that are currently happening is the distribution and falsification of information through fake e-certificates. The purpose of this study is to improve security, and check the authenticity and validity of data on e-certificates using steganography techniques with the Least Significant Bit (LSB) method. Steganography is used to disguise confidential information in digital media so that confidential information is difficult to detect by unauthorized parties. The image on the certificate in the form of a pdf file will be inserted with information to validate whether the certificate is genuine or not, by reading the pixels in the image in the file. In this study, the data to be inserted is in the form of a checksum value in the form of 32 hexadecimal characters and also e-certificate information in the form of a JSON string. The results of this study are a website-based application that is capable of checking the authenticity of e-certificates.

Full Text:

PDF (Indonesian)

References


M. M. Yahaya and A. Ajibola, “Cryptosystem for Secure Data Transmission using Advance Encryption Standard (AES) and Steganography,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., no. May 2021, pp. 317–322, 2019, doi: 10.32628/cseit195659.

A. A. Aripin, “Potensi pemanfaatan teknologi Blockchain terhadap ketepatan waktu, efisiensi dan keamanan proses operasi pada subsektor perbankan,” 2018.

F. Kurniawan, M. L., & Erna Dewi, “Peran Kepolisian Dalam Penyidikan Tindak Pidana Penyalahgunaan Ijazah Palsu.,” J. Poenale, 2018.

E. Walia and P. Jain, “An Analysis of LSB & DCT based Steganography,” Glob. J. Comput. Sci. Technol. GJCST Comput. Classif. F, vol. 10, no. 1, p. 1, 2010.

K. A. Al-Afandy, O. S. Faragallah, A. Elmhalawy, E. S. M. El-Rabaie, and G. M. El-Banby, “High security data hiding using image cropping and LSB least significant bit steganography,” Colloq. Inf. Sci. Technol. Cist, vol. 0, pp. 400–404, 2016, doi: 10.1109/CIST.2016.7805079.

N. Bansal, V. K. Deolia, A. Bansal, and P. Pathak, “Digital image watermarking using least significant bit technique in different bit positions,” Proc. - 2014 6th Int. Conf. Comput. Intell. Commun. Networks, CICN 2014, pp. 813–818, 2014, doi: 10.1109/CICN.2014.174.

P. C. Mandal, I. Mukherjee, G. Paul, and B. N. Chatterji, “Digital image steganography: A literature survey,” Inf. Sci. (Ny)., vol. 609, pp. 1451–1488, Sep. 2022, doi: 10.1016/j.ins.2022.07.120.

K.-H. Jung and K.-Y. Yoo, “Steganographic method based on interpolation and LSB substitution of digital images,” Multimed. Tools Appl., vol. 74, no. 6, pp. 2143–2155, Mar. 2015, doi: 10.1007/s11042-013-1832-y.

X. Zhou, W. Gong, W. Fu, and L. Jin, “An improved method for LSB based color image steganography combined with cryptography,” in 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), Jun. 2016, pp. 1–4. doi: 10.1109/ICIS.2016.7550955.

A. Muchbarak, N. AZ, and M. Hardjianto, “Prototipe Validasi Dan Proteksi Data Pada File Image Dengan Menggunakan Advanced Encryption Standard Dan Least Significant Bit Berbasis Android,” ??????????? ? ????????????, vol. 59, no. 9–10, 2014, doi: 10.13140/RG.2.1.2483.3449. , vol. 59, no. 9–10, 2014, doi: 10.13140/RG.2.1.2483.3449.




DOI: http://dx.doi.org/10.30998/faktorexacta.v16i3.17314

Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

template doaj grammarly tools mendeley crossref SINTA sinta faktor exacta   Garuda Garuda Garuda Garuda Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Flag Counter

site
stats View Faktor Exacta Stats


pkp index