Steganography based on the B217AN Algorithm for secret messages on flip horizontal and resize image
Information System, Universitas Bina Sarana Informatika, Pontianak, Indonesia.
Review
World Journal of Advanced Engineering Technology and Sciences, 2023, 09(01), 017–028.
Article DOI: 10.30574/wjaets.2023.9.1.0133
Publication history:
Received on 23 March 2023; revised on 29 April 2023; accepted on 02 May 2023
Abstract:
The method of storing confidential information in digital images is known as steganography techniques, usually used for security and privacy purposes in various fields including online communication. The concept is to produce a stego image, where the information stored should not change when it is inserted or translated. The application of steganography techniques to digital images does not raise suspicions that an image has secret information or messages embedded. The spread spectrum steganography method is inspired by a communication model that transmits narrowband signals to wideband frequency channels by spreading or spreading, so that through spread spectrum messages embedded in secret information or messages can spread. In order to read the message, the recipient needs an algorithm which is a crypto key and a stego key. The purpose of this research is to test the steganography method by implementing PCMK/B with the Python programming language. The results of steganography testing using the B217AN algorithm can tolerate interference, distortion such as changes in brightness and contrast in JPEG, Gaussian, Poisson, salt and pepper compression, and loss. Tests on horizontal flip and resize stego image data using the B217AN steganography algorithm were successfully carried out, and information or secret messages that have been embedded in the cover image which later became the stego image can be read as it is. in its original condition and not altered or destroyed.
Keywords:
Stego image; Steganography; Horizontal flip; Resize stego image; B217AN
Full text article in PDF:
Copyright information:
Copyright © 2023 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0