Analysis of T-Code Compression Methods to Increase Capacity of SSCE Method

##plugins.themes.academic_pro.article.main##

Marzuki Leo
Charles Halim
Iola Iola
Jeremy Valtino
Insidini Fawwaz

Abstract

The process of hiding classified information can take advantage of the steganography method. However, media such as images, audio or video is not efficient, due to the large size of the media, making text media a great solution for hiding confidential information. In 2011, a new steganographic method was introduced that uses special code generation based on the use of unlimited articles or on conjunctions with nouns that are not specific or specific to English. A new code representation method Secret Steganography Code for Embedding (SSCE) was also used to increase security. However, there is a problem with the application of this text steganography method, namely that the secret message has not been compressed, where if the cover text is smaller than the secret message, the secret message cannot be inserted into the cover text. To solve this problem, a text compression method can be applied. One of the compression methods that can be applied is the T-Code text compression method. The T-Code method uses the concept of iterative code construction and self-synchronization to compress and decompress text. From the testing process, information was obtained that every change of letter or word in the position where the secret message bit is attached will cause the secret message that is extracted to become chaotic and the T-Code compression method can increase the capacity of the cover document by 10.61%.

##plugins.themes.academic_pro.article.details##

How to Cite
Leo, M., Halim, C., Iola, I., Valtino, J. and Fawwaz, I. (2020) “Analysis of T-Code Compression Methods to Increase Capacity of SSCE Method”, Jurnal Mantik, 4(3), pp. 1676-1687. doi: 10.35335/mantik.Vol4.2020.978.pp1678-1689.

References

  1. Achmad Ardiansyah dan Mepa Kurniasih, (2018). Penyembunyian Pesan Rahasia Pada Citra Digital Dengan Teknik Steganograpi Menggunakan Metode Least Significant Bit, Vol. XIII Nomor 3 November 2018 – Jurnal Teknologi Informasi, ISSN: 1907-2430.
  2. Bhattacharyya, S., I. Banerjee dan G. Sanyal (2010). A Novel Approach of Secure Text Based Steganography Model using Word Mapping Method (WMM), International Journal of Computer and Information Engineering 4:2.
  3. Endang Ratnawati Djuwitaningrum, Melisa Apriyani, (2016). Teknik Steganografi Pesan Teks Menggunakan Metode Least Significant Bit dan Algoritma Linear Congruential Generator (Text Message Steganography Using Least Significant Bit Method and Linear Congruential Generator Algorithm), JUITA ISSN: 2086-9398 Vol. IV Nomor 2.
  4. Frida Effelyanti Naibaho, (2020). Implementasi Algoritma J-Bit Encoding Pada Kompresi File PDF, Jurnal Sistem Komputer dan Informatika (JSON) Volume 1, Nomor 3, Mei 2020, e-ISSN 2548-8368, DOI 10.30865/json.v1i3.2153.
  5. Indradip Banerjee, Souvik Bhattacharyya, Gautam Sanyal (2011). Novel Text Steganography through Special Code Generation, International Conference on Systemics, Cybernetics and Informatics.
  6. Kibbee D.Streetman (2010). Steganography, Art of Covert Communications.
  7. Mohammed Al-Mualla and Prof. Hussain Al-Ahmad, Information Hiding: Steganography and Watermarking. [Online]. Available: http://www.emirates.org/ieee/information_hiding.pdf.
  8. Sofia Saidah, Nur Ibrahim, Mochammad Haldi Widianto, (2019). Pengamanan Pesan pada Steganografi Citra dengan Teknik Penyisipan Spread Spectrum, ELKOMIKA, ISSN (p): 2338-8323, ISSN (e): 2459-9638.
  9. William Steven, Viki Afriyandi, Kristien Margi Suryaningrum, (2019). Implementasi Algoritma Ezstego Untuk Menyembunyikan Pesan Terenkripsi Dengan Playfair Cipher Pada Citra GIF, Jurnal Teknologi Informasi, Vol. 5, No. 2, Desember 2019, E-ISSN 2623-1700.
  10. Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal: “Data Hiding Through Multi Level Steganography and SSCE” Journal on “Journal of Global Research in Computer Science, Volume 2, No. 2, February 2011”.