Comparative Analysis of Openpuff and Openstego Tools
Viewed = 0 time(s)
Abstract
Steganography is the science and art of hiding information in a medium so that its existence is not detected by unauthorized parties. Media that can be used in steganography are text, images, audio, and video. However, the media that is often used is image. Various steganography tools have been developed with their respective strengths and weaknesses, such as Hide in Picture; Openstego; Image Steganography; Invisible Secret 4; S-Tools; Hide 'N' Send; Online Image Steganography, Openpuff, and others. Researchers carried out a comparative analysis of the steganography tools Openpuff and Openstego with test parameters for the quality of the images produced and time efficiency. Test the quality of the resulting image using MSE, PSNR, NCC, SSIM, and time-efficient testing seen from embedding and extraction time. Based on the research results, show that Openstego has better image quality and time efficiency compared to Openpuff. The type of image format used and the size of the embedded message can affect the quality of the resulting image and the time used. The best test results were obtained, namely MSE=0.0009, PSNR=78.5438 dB, NCC=0.999999, SSIM=0.999993, and required embedding time=0.075 second and extraction time=0.084 second.
Keywords: Image Quality, Openpuff, Openstego, Steganography, Time.
References
Arora, N. (2022). Types and Tools of Steganography. International Journal for Research in Applied Science & Engineering Technology (IJRASET), 10(6), 2049–2053. https://doi.org/10.22214/ijraset.2022.44279
Darwis, D., & Pasaribu, A. F. O. (2020). Komparasi Metode DWT Dan SVD Untuk Mengukur Kualitas Citra Steganografi. Jurnal Ilmiah NERO, 5(2), 100–108. https://doi.org/10.21107/nero.v5i2.175
Dihni, V. A. (2022). Peretasan, Bentuk Serangan Digital Paling Banyak Terjadi di Indonesia pada 2021. https://databoks.katadata.co.id/datapublish/2022/04/07/peretasan-bentuk-serangan-digital-paling-banyak-terjadi-di-indonesia-pada-2021
Guptaa, L. K., Singhb, A., Yadavc, V. K., & Srivastava, A. (2020). Performance Analysis of Open Puff Steganography Tool Using Various Image Formats. International Conference on Innovative Advancement in Engineering and Technology (IAET-2020), 1–7. https://doi.org/10.2139/ssrn.3550941
Hidayat, M. A., Sihombing, M., & Sihombing, A. (2022). Teknik Algoritma Elgamal Dan Steganografi First Of File (FOF) Untuk Penyisipan Pesan Dalam Citra. Jurnal Teknik Informatika Kaputama (JTIK), 6(1). https://doi.org/10.21063/jtif.2020.v8.1.25- 31
Islam, M. A., Riad, Md. A.-A. K., & Pias, T. S. (2020). Performance Analysis of Steganography Tools. 2020 2nd International Conference on Advanced Information and Communication Technology (ICAICT), 428–433. https://doi.org/10.1109/ICAICT51780.2020.9333473
Jani Anbarasi, L., Prassanna, J., MD, A. Q., Christy Jackson, J., Manikandan, R., Rahim, R., & Suseendran, G. (2020). Visual secret sharing: A review. Journal of Critical Reviews, 7(9), 1212–1216.
Kamil, P. H., Masruroh, S. U., Hakiem, N., Simangunsong, F., & Bidari, A. S. (2018). Robustness Analysis of a Steganography File Against a Media Sharing Process In Instant Messaging Applications. ICONQUHAS 2018, 1–13. https://doi.org/10.4108/eai.2-10-2018.2295574
Kasapbaşı, M. C. (2019). A New Chaotic Image Steganography Technique Based on Huffman Compression of Turkish Texts and Fractal Encryption with Post-Quantum Security. IEEE Access, 7, 1–16. https://doi.org/10.1109/ACCESS.2019.2946807
Kumar, A., Jamnadas, H., Sharma, V., Muyeen, S. M., & Ali, A. B. M. S. (2023). A Review of Image Steganography Tools. International Journal for Computers & Their Applications, 30(1), 75–87.
Laksiati, D. (2021). Implementasi Steganografi Image Processing Dan Enkripsi AES Menggunakan Openstego. Jurnal Akbar Juara Yayasan Akrab Pekanbaru, 6(1), 30–40. https://doi.org/10.58487/akrabjuara.v6i1.1391
Malese, L. P. (2021). Penyembunyian Pesan Rahasia Pada Citra Digital dengan Teknik Steganografi Menggunakan Metode Least Significant Bit (LSB). Jurnal Ilmiah Wahana Pendidikan, 7(5), 343–354. https://doi.org/10.5281/zenodo.5563416
Mulyono, I. U. W., Kusumawati, Y., & Ningrum, N. K. (2023). Analisa Visual Citra Hasil Kombinasi Steganografi dan Kriptografi Berbasis Least Significant Bit Dalam Cipher. Jurnal Masyarakat Informatik, 14(1), 16–18. https://doi.org/10.14710/jmasif.14.1.51484
Nurhasanah, Rafi, M. Y., & Rosyani, P. (2023). Keamanan Data Menggunakan Teknik Steganografi Dengan Metode End Of File (EOF). Jaringan Sistem Informasi Robotik (JSR), 7(2), 232–240. https://doi.org/10.58486/jsr.v7i2.300
Nurul, S., Anggrainy, S., & Aprelyani, S. (2022). Faktor-Faktor Yang Mempengaruhi Keamanan Sistem Informasi: Keamanan Informasi, Teknologi Informasi Dan Network (Literature Review SIM). JEMSI: Jurnal Ekonomi Manajemen Sistem Informasi, 3(5), 564–573. https://doi.org/10.31933/jemsi.v3i5
Oladeji, F. A., Awe, O., Aro, T. O., Afolorunso, A. A., Ibor, A., & Uwadia, C. O. (2020). Comparative Analysis Of Images Based On Least Significant Bit (LSB) Steganography. FUW Trends in Science & Technology Journal, 5(3), 740–744. http://ftstjournal.com/uploads/docs/53%20Article%2019.pdf
Permana, A. A., & Amna, H. (2022). Implementasi Steganografi File Citra Digital Menggunakan Metode Least Significant Bit. JT: Jurnal Teknik, 11(1), 62–72. https://doi.org/10.31000/jt.v11i1.6161
Rahman, S., Masood, F., Khan, W. U., Ullah, N., Khan, F. Q., Tsaramirsis, G., Jan, S., & Ashraf, M. (2020). A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique. Computers Materials & Continua, 64(1), 31–61. https://doi.org/10.32604/cmc.2020.09186
Ramadhan, K. R., & Wirawan. (2021). Teknik Penyembunyian Data yang Reversible pada Citra JPEG Terenkripsi. JURNAL TEKNIK ITS, 10(2), 277–283. https://doi.org/10.12962/j23373539.v10i2.68560
Rohayah, S. (2022). Implementasi Teknik Steganography Pada File Gambar Dan Audio Dengan Menggunakan Metode LSB. OKTAL: Jurnal Ilmu Komputer Dan Science, 2(2), 496–503. https://journal.mediapublikasi.id/index.php/oktal/article/view/1073/948
Saleh, A., Harahap, M., & Indra, E. (2020). Kombinasi Jaringan Learning Vector Quantization Dan Normalized Cross Correlation Pada Pengenalan Wajah. JUSIKOM PRIMA (Junal Sistem Informasi Ilmu Komputer Prima), 3(2). https://doi.org/10.34012/jusikom.v3i2.851
Sara, U., Akter, M., & Uddin, M. S. (2019). Image Quality Assessment through FSIM, SSIM, MSE and PSNR — A Comparative Study. Journal of Computer and Communications, 7(3), 8–18. https://doi.org/10.4236/jcc.2019.73002
Siaulhak, & Kasma, S. (2023). Sistem Pengiriman FileMenggunakan Steganografi Pengolahan Citra Digital Berbasis Matriks Laboratory. BANDWIDTH: Journal of Informatics and Computer Engineering, 1(2). https://doi.org/10.53769/bandwidth.v1i2.522
Singh, N. (2017). Survey Paper on Steganography. International Refereed Journal of Engineering and Science (IRJES), 6(1), 68–71. http://www.irjes.com/Papers/vol6-issue1/K616871.pdf
Sloan, T., & Castro, J. H. (2018). Dismantling OpenPuff PDF steganography. Sciencedirect, 25, 90–96. https://doi.org/10.1016/j.diin.2018.03.003
Sumijan, Purnama, P. A. W., & Arlis, S. (2019). PENINGKATAN KUALITAS CITRA CT-SCAN DENGAN PENGGABUNGAN METODE FILTER GAUSSIAN DAN FILTER MEDIAN. Jurnal Teknologi Informasi Dan Ilmu Komputer (JTIIK), 6(6), 591–600. https://doi.org/10.25126/jtiik.20196870
Wang, Y., Zhao, X., & Cao, Y. (2020). Detecting the fingerprint of video data hiding tool OpenPuff. https://doi.org/10.1016/j.fsir.2020.100088
Copyright (c) 2024 Linda Heryanti, Wiga Maulana Baihaqi, Ariska Nurul Habibah
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.