KOMPARASI METODE DWT DAN SVD UNTUK MENGUKUR KUALITAS CITRA STEGANOGRAFI
Abstract
Full Text:
PDF (Indonesian)References
B. Mishra, R. Beg and V. P. Singh, "Information Security Through Digital Image Steganography Using Multilevel and Compression Technique," MIT International Journal of Computer Science & Information Technology, vol. 3, 2016.
N. B. Pamungkas, D. Darwis, D. Nurhayanti and A. T. Prastowo, "Perbandingan Algoritma Pixel Value Differencing dan Modulus Function pada Steganografi untuk Mengukur Kualitas Citra dan Kapasitas Penyimpanan," Jurnal Informatika, vol. 20, no. 1, pp. 67-77, 2020.
D. Darwis, R. Prabowo and N. Hotimah, "Kombinasi Gifshuffle, Enkripsi AES dan Kompresi Data Huffman Untuk Meningkatkan Keamanan Data," Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), vol. 5, no. 4, pp. 389-394, 2018.
A. Suhendri, B. D. Juniansyah, M. J. Priono and D. Darwis, "Implementasi Kombinasi Affine Cipher dan One-time Pad Dalam Pengamanan Pengiriman Pesan," Jurnal Informatika, vol. 18, no. 2, pp. 124-129, 2018.
M. S. Kachera, G. Gupta and N. Jain, "An Improved Noise Resistant Image Steganography Technique Using Zero Cross Edge Detection Method," International Research Journal of Engineering and Technology (IRJET), vol. 4, no. 3, 2017.
D. Darwis and K. Kisworo, "Teknik Steganografi untuk Penyembunyian Pesan Teks Menggunakan Algoritma End Of File," Explore: Jurnal Sistem Informasi dan Telematika (Telekomunikasi, Multimedia dan Informatika), vol. 8, no. 2, pp. 98-108, 2017.
D. Darwis, "Teknik Steganografi untuk Penyembunyian Pesan Teks Menggunakan Algoritma GIFSHUFFLE," Jurnal Teknoinfo, vol. 11, no. 1, pp. 19-24, 2017.
C. Lai and C. Tsai, "Digital Image Watermarking using Discrete Wavelet Transform and Singular alue Decomposition," IEEE Transactions on Interumentation, vol. 15, 2020.
H. S. M. Reddy, "High Capacity and Security Steganography using Discrete Wavelet Transform," International Journal of Computer Science and Security, vol. 3, 2010.
Y. He, T. Gan, W. Chen and H. Wang, "Adaptive Denoising by SIngular Value Decomposition," IEEE, 2011.
R. A. Nurfauzan, B. Hidayat and S. Saidah, "Analisis Steganografi Ganda Pada Citra Digital Menggunakan Metode Discrete Wavelet Transform Dan Singular Value Decomposition Dengan Penyisipan Spread Spectrum Image Steganography," in e-Proceeding of Engineering, 2018.
S. Singh and T. J. Siddiqui, "Robust Image Steganography Using Complex Wavelet Transform," IEEE, 2013.
Y. J. Chanu, K. M. Singh and T. Tuitung, "A Robust Steganographic Method Based on Singular Value Decompostion," International Journal of Information & Computation Technology, vol. 4, 2014.
D. Darwis, "Implementasi Steganografi pada Berkas Audio Wav untuk Penyisipan Pesan Gambar Menggunakan Metode Low Bit Coding," EXPERT, vol. 5, no. 1, pp. 6 - 11, 2015.
A. Prawirawan, I. Isnawaty and R. Ramadhan, "Implementasi Discrete Wavelet Transform Untuk Penyisipan Teks Pada Gambar," Semantik, vol. 1, no. 1, pp. 11-18, 2015.
Q. Guo, C. Zhang, Y. Zhang and H. Liu, "An Efficient SVD-Based Method for Image Denoising," IEEE, 2016.
D. Darwis, A. Junaidi and W. Wamiliana, "A New Approach of Steganography Using Center Sequential Technique," in Journal of Physics: Conference Series, Bandar Lampung, 2019.
Awate and M. M. Patil, "Modulus Function and Pixel Value Differencing Coupled with Modified Pixel Indicator Based Secret Data Hidding Method," International Journal of Advances in Science Engineering and Technology, vol. 4, no. 2, pp. 26-29, 2016.
B. Bhatu and H. y. Shah, "Customized Approach to Increase Capacity and Robustness in Image Steganography," Coimbatore, 2016.
DOI: http://dx.doi.org/10.21107/nero.v5i2.175
Refbacks
- There are currently no refbacks.
Copyright (c) 2020 Network Engineering Research Operation

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
NERO (Networking Engineering Research Operation) is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.