Main Article Content

Bayu Angga Wijaya
Adrian Julio Manalu
Bayu Andreas Tarigan
Lovely Septian Silitonga

Abstract

Advances in human thinking patterns make people realize that information technology is an important part of civilization. In line with the development of information technology, many parties are not responsible for committing crimes such as theft and falsification of information from data. These problems can be overcome using a variety of methods and techniques, one of which is steganography. Steganography is a technique of hiding confidential data in a digital (media) container so that the existence of the secret data is difficult to know by irresponsible people or parties. The purpose of this study is to provide a solution to the problem of hiding messages into images using two different steganographic methods, namely LSB and DCT, then both methods will be tested for their efficiency. In this study, it was concluded that the PSNR value for LSB steganography was 8.887, and the MSE value was 104.85. On the other hand, DCT Steganography got a PSNR of 83,728, and an MSE value of 0.0592. From the PSNR and MSE test results, it can be concluded that the better image quality comes from DCT Steganography, this is because, in processing DCT images, the author must convert the images first, then can encode, but this conversion is not done on the LSB method.            

Downloads

Download data is not yet available.

Article Details

How to Cite
Wijaya, B. A., Manalu, A. J. . ., Tarigan, B. A. . . and Silitonga, L. S. . . (2021) “Steganography Text Message Using LSB and DCT Methods”, Jurnal Mantik, 5(3), pp. 1825-1832. Available at: https://iocscience.org/ejournal/index.php/mantik/article/view/1767 (Accessed: 18April2026).
References
[1] Aji, I. B. 2020. Citra Hasil Dari Steganografi Discrete Cosine. Citisee, 1–9.
Basuki, R. S., and Maranggani, E. N. (2011). Installing Pesan Rahasia Di Dalam Suatu Gambar Dengan Metode Least Critical Bit Addition ( Lsb ). Course Nasional Teknologi Informasi and Komunikasi Terapan 2011 (Semantik 2011), 2011(Semantik), 2–7.
[2] D. A. N., Hersaputra, Y.,Sarjana, G. 2020. Pemanfaatan Metode Altered Least Huge Bit dan Teknik Adjustment Reshape Transposisi untuk Steganografi. Pendidikan, K., Kebudayaan, D. A. N., Tinggi, S., Informatika, M., Komputer.
[3] Jamasoka, S. 2012. Perbandingan Steganografi pada Citra Gambar Designs Exchange Organization dengan Algoritma Gifshuffle dan Metode Least Critical Bit. Kriptografi, (13509080).
[4] Nirmala, E. 2020. Penerapan Steganografi Document Gambar Menggunakan Metode Least Huge Bit (LSB) dan Algoritma Kriptografi Progressed Encryption Standard (AES) Berbasis Android. Jurnal Informatika Universitas Pamulang, 5(1), 36.
[5] Novani, P. I. S., Si, S., Ii, P., and Maliki, I. (n.d.). Steganografi Pada Media Video Computerized Dengan Menggunakan Metode Fft ( Quick Fourier Change ) Dan Lsb ( Least Critical Bit ) Oleh?: Rizki Ayus Gusmayuda Fakultas Teknik dan Ilmu Komputer Jurusan Teknik Informatika Universitas Komputer Indonesia Abstra.
[6] Pradita, R., and Nurhaida, I. 2020. Implementasi Steganografi Video dengan Menggunakan Metode Egypt, Least Critical Bit (LSB) dan Least Huge Bit (LSB) Fibonacci Edge Pixel. Jurnal Telekomunikasi Dan Komputer, 10(1), 25.
[7] Rekursif, J., Ardiansyah, H., Susilo, B., and Erlansari, A. (2017). Penerapan Metode Dct ( Discrete Cosine Change ) Pada Aplikasi Penyembunyian. Jurnal Rekursif, 5(1), 66–74.
[8] Santiko, I. 2016. Implementasi Model Steganografi Dalam Mengelola Kerahasiaan Informasi Dengan Metode LSB ( Least Critical Bit ). Citisee, 44–52.
[9] Widyawati, L., Riadi, I., and Prayudi, Y. (2020). Near Investigation of Picture Steganography utilizing SLT, DCT and SLT-DCT Calculation. MATRIK?: Jurnal Manajemen, Teknik Informatika Dan Rekayasa Komputer, 20(1), 169–182.
[10] Wijaya, B. A., Nugraha, A., Juandry, J., Okinawa, J. and Kinoto, J. (2020) “Film Recommendation System with Social-Union Algorithm: Film Recommendation System with Social-Union Algorithm”, Jurnal Mantik, 4(2), pp. 1278-1284. doi: 10.35335/mantik.Vol4.2020.932.pp1278-1284.
[11] Wijaya, B. A. 2018. The steganographic video analysis uses combination of discrete cosine transform and discrete wavelet transform algorithms. J. Phys.: Conf. Ser. 1116 022046