Implementasi Pengacakan Bit Nilai Warna Spasi Pada Steganografi Di Dokumen Teks OOXML

  • Tri Yatmo Noveary Universitas Bunda Mulia
  • Kevin Ekaputra Universitas Bunda Mulia
  • Halim Agung Universitas Bunda Mulia
##plugins.pubIds.doi.readerDisplayName##: https://doi.org/10.29207/resti.v2i2.292
Keywords: Steganography, Office Open XML, space color code bits

Abstract

Steganography exists due to the need to hide data in another data. The purpose of this research is to find another alternative in doing steganography via Office Open XML text document files. The research is done by library review, and application building. Design is done using flowcharts. Tests are done by comparing the result, and testing the endurance of the message via file format change, and content and name changing. From the result of the result, steganography done using space color code bit position randomization will not visually affect the document significantly. The message can endure conversions to file formats DOC, ODT, and PDF, 93% endure conversions to RTF file format, and cannot endure conversions to TXT file format, and can endure content change as long as theres the sequence of files, and the spaces left intact.

Downloads

Download data is not yet available.

References

[1] ECMA-376-1:2016 Office Open XML File Formats – Fundamentals and Markup Language Reference, ECMA-376-1:2016, 2016.
[2] I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich, dan T. Kalker, Digital Watermarking and Steganography, 2nd ed. Burlington, Morgan Kaufmann, 2007.
[3] E. Barker, dan J. Kelsey, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, 2015. [Online]. Available: https://www.nist.gov. Accessed on 21 September 2017
[4] D. Fegiannata, “Implementasi Pengacakan Pixel Pada Metode Steganografi LSB dengan Java,” Skripsi S. Kom., Fakultas Teknologi dan Desain, Universitas Bunda Mulia, Jakarta, Indonesia, 2014.
[5] A. Westfeld, “F5 – A Steganographic Algorithm,” di 4th International Information Hiding Workshop, Pittsburgh, 2001, pp 289-301.
[6] B. Madoš, J. Hurtuk, M. ?opjak, P. Hamaš, dan M. Ennert, “Steganographic Algorithm for Information Hiding Using Scalable Vector Images,” Acta Electrotechnica et Informatica, vol.14, no. 4, pp. 42-45, Desember, 2014. doi: 10.15546/aeei-2014-0040, [Online], Available: http://www.aei.tuke.sk/.
[7] K. Gopalan, “Audio Steganography Using Bit Modification,” di IEEE International Conference on Acoustics, Speech and Signal Processing, Juli, 2003. doi: 10.1109/ICASSP.2003.1202390, [Online], Available: https://www.researchgate.net/.
[8] R.J. Mstafa, K.M. Elleithy. “A Highly Secure Video Steganography using Hamming Code (7, 4),” di Proceedings of Systems, Applications and Technology Conference (LISAT), Mei, 2014, doi: 10.1109/LISAT.2014.6845191, [Online], Available: https://scholarworks.bridgeport.edu/.
[9] A. Castiglione, B. D’Alessio, A. De Santis, F. Palmieri, “New Steganographic Techniques for the OOXML File Format,” di Availability, Reliability and Security for Business, Enterprise and Health Information Systems, Agustus, 2011, pp 344-358, doi: 10.1007/978-3-642-23300-5_27, [Online], Available: https://link.springer.com/.
[10] M. Khairullah, “A Novel Text Steganography System Using Font Color of the Invisible Characters in Microsoft Word Documents,” di Second International Conference on Computer and Electrical Engineering, 2009, Desember, 2009, doi: 10.1109/ICCEE.2009.127, [Online]. Available: http://ieeexplore.ieee.org/.
[11] D. Putra, “Teknik Steganografi pada Rich Text Format File Dengan Memanfaatkan Atribut Warna Teks,” Skripsi S. Kom., Fakultas Matematika dan Ilmu Pengetahuan Alam, Institut Pertanian Bogor, Bogor, 2010.
[12] ?opjak, Marek, dkk., (2014), Steganographic Algorithm for Information Hiding Using Scalable Vector Images, Acta Electrotechnica et Informatica, Vol 14, issue 4, pp 42-45. http://www.aei.tuke.sk. Accessed on 5 November 2017.
[13] Mishra, Nishchol, Sharma, Sanjeev, dan Yadav, Pooja, (2013), A secure video steganography with encryption based on LSB technique, 2013 IEEE International Conference on Computational Intelligence and Computing Research, Vol 2, pp 1-5. https://ieeexplore.ieee.org/. Accessed on 23 November 2017.
Published
2018-06-08
Section
Technology Information Article