Academic literature on the topic 'Steganografi'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Steganografi.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Steganografi"
Hidayasari, Nurmi, Imam Riadi, and Yudi Prayudi. "Steganalisis Blind dengan Metode Convolutional Neural Network (CNN) Yedroudj- Net terhadap Tools Steganografi." Jurnal Teknologi Informasi dan Ilmu Komputer 7, no. 4 (August 7, 2020): 787. http://dx.doi.org/10.25126/jtiik.2020703326.
Full textJatmoko, Cahaya, L. Budi Handoko, Christy Atika Sari, and De Rosal Ignatius Moses Setiadi. "Uji Performa Penyisipan Pesan Dengan Metode LSB dan MSB Pada Citra Digital Untuk Keamanan Komunikasi." Dinamika Rekayasa 14, no. 1 (March 14, 2018): 47. http://dx.doi.org/10.20884/1.dr.2018.14.1.200.
Full textYakti, Bayu Kumoro, and Ragiel Hadi Prayitno. "Perbandingan Dan Analisa Gambar Pada Steganografi Berdasarkan MSE Dan PSNR." ICIT Journal 6, no. 2 (August 11, 2020): 138–52. http://dx.doi.org/10.33050/icit.v6i2.1105.
Full textSoleh, Oleh, Fifit Alfiah, and Budi Yusuf. "Perancangan Aplikasi Steganografi Dengan Teknik LSB dan AlgoritmaRC4 & Base64 Encoding." Technomedia Journal 3, no. 1 (August 27, 2018): 1–15. http://dx.doi.org/10.33050/tmj.v3i1.493.
Full textUtomo, Didi Susilo Budi, Jems Jems, Hari Purwadi, and Rihartanto Rihartanto. "PENYEMBUNYIAN TEKS TERENKRIPSI PADA CITRA RGB MENGGUNAKAN METODA LSB DENGAN POLA ZIG-ZAG." Masyarakat Telematika Dan Informasi : Jurnal Penelitian Teknologi Informasi dan Komunikasi 10, no. 2 (December 9, 2019): 18. http://dx.doi.org/10.17933/mti.v10i2.152.
Full textSoetarmono, Anggya N. D. "STUDI MENGENAI APLIKASI STEGANOGRAFI CAMOUFLAGE." Teknika 1, no. 1 (July 1, 2012): 55–65. http://dx.doi.org/10.34148/teknika.v1i1.7.
Full textLaila Qadriah, Sayed Achmady,. "OPTIMALISASI STEGANOGRAFI AUDIO UNTUK PENGAMANAN INFORMASI." Jurnal Sains Riset 10, no. 1 (April 15, 2020): 45–50. http://dx.doi.org/10.47647/jsr.v10i1.218.
Full textPradita, Ranida, and Ida Nurhaida. "Implementasi Steganografi Video dengan Menggunakan Metode Egypt, Least Significant Bit (LSB) dan Least Significant Bit (LSB) Fibonacci Edge Pixel." Jurnal Telekomunikasi dan Komputer 10, no. 1 (April 13, 2020): 25. http://dx.doi.org/10.22441/incomtech.v10i1.7282.
Full textSunardi, Sunardi, Imam Riadi, and Muh Hajar Akbar. "Steganalisis Bukti Digital pada Media Penyimpanan Menggunakan Metode Static Forensics." Jurnal Nasional Teknologi dan Sistem Informasi 6, no. 1 (May 31, 2020): 1–8. http://dx.doi.org/10.25077/teknosi.v6i1.2020.1-8.
Full textGunawan, Karya, and A. Sjamsjiar Rachman. "Kinerja Metode Minimum Error Least Significant Bit Replacement Advanced Encryption Standard Pada Citra Digital." EXPLORE 9, no. 1 (January 1, 2019): 36. http://dx.doi.org/10.35200/explore.v9i1.176.
Full textDissertations / Theses on the topic "Steganografi"
Härö, Jonny. "Steganografi : Hur steganografi kan påverka nätverkssäkerhet." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20107.
Full textNorman, Anton, and Niklas Paulsson. "En ny metod för steganalys." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-29532.
Full textAndersson, Amanda, and Daniel Karlsson. "Konsten att steganografera." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31996.
Full textStensmar, Isak. "Steganografi i bilder : En studie om bildformat och visuella bildrepresentationens påverkan vid lagring av data med hjälp av en steganografisk metod." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12887.
Full textContext. By using image steganography it is possible to hide a large amount of data without making big differences to the initial picture. One commonly used method is Least Significant Bit (LSB), which often is considered one of the first method implemented and used in Image Steganography. Apart from the method, the user also have a choice when deciding what picture he or she should use as the carrier of information. What people often try to accomplish is to have a very complex method that hides the data in an efficient way, but forgets about the picture used as a carrier. In the end, all measurements will be done on the picture. Objectives. This study will investigate if different image formats, BMP, PNG, JPEG and TIFF, have an impact on the differences when comparing the original picture with the modified, given that data is stored with a steganographic method and is gradually increased. The study will also investigate if what the picture visually represent will have an effect on the measurements. Methods. An extended method of the Least Significant Bit method will be implemented and used to create different pictures with different kinds of image formats. An experiment will investigate these formats by taking measurements with MSE (Mean Squared Error), PSNR (Peek Signal-to-Noise Ratio) and SSIM (Structural Similarity). Results. When comparing different formats one could say that JPEG showed better performance by having a lower differential value between each test, by looking at the graphs and tables. BMP, PNG and TIFF had minimal changes between each other for each test. As for the visual representation of the pictures, two pictures showed a higher differential value after each test than the remaining three. Conclusions. The results from the experiment showed that which compression method a format uses will have an impact on the measurement. The results also showed that the pictures’ visual representation could have some impact on the measurement of a picture but more data is needed to conclude this theory.
Vaske, Camilla. "Dolda meddelanden i musik : En ny metod för musikalisk steganografi." Thesis, Högskolan i Halmstad, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-34787.
Full textSteganography is the science of hiding communication. Information is hidden in carrier objects such as images, software, movies and music. To be able to hide information in music, different techniques can be applied depending on the file formats used. This study describes musical steganography in general, but the primary focus of the report is the techniques of MIDI steganography. MIDI is a standard music technology protocol that is used around the world to create music and make it available for listening. Since no publically available method for MIDI steganography has been found (even though there are methods described in the literature), the study also aims to investigate how an algorithm for MIDI steganography can be designed so that it satisfies capacity and security criteria. As part of the study, a method for using velocity values to hide information in music has been designed and evaluated, during which the method is found to have capacity comparable with similar methods. In an audibility test, it is observed that audible impact on the music can not be distinguished at any reasonable significance level, which means that also a security criterion is met.
Pruccoli, Maichol. "Steganografia di immagini." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textPoremba, Tomáš. "Digitální steganografie a stegoanalýza." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385979.
Full textPaladino, Pasquale. "La Steganografia e i suoi molteplici usi." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2011. http://amslaurea.unibo.it/1962/.
Full textBayer, Peter, and Henrik Widenfors. "Information Hiding : Steganografic Content in Streaming Media." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2298.
Full textAndersson, Julius, and David Engström. "A study in how to inject steganographic data into videos in a sturdy and non-intrusive manner." Thesis, KTH, Hälsoinformatik och logistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-253021.
Full textDet är önskvärt för företag att kunna gömma data i videor så att de kan hitta källorna till obehörig delning av en video. Den data som göms borde skada den ursprungliga datan så lite som möjligt medans det också är så svårt som möjligt att radera den gömda datan utan att den ursprungliga datan skadas mycket. Studien kom fram till att det bästa stället att gömma data i videor är i den visuella delen så datan göms i bilderna i videon. Två metoder skapades för att injektera gömd data och tre skapades för att förstöra den gömda datan. En injektionsmetod ändrar pixelvärdet av bilden direkt för att gömma datat medans den andra transformerar bilden till cosinusvågor och ändrar sedan de vågorna för att gömma datat. Attacker utformades för att testa hur svårt det var att förstöra den gömda datan. Metoderna för att attackera den gömda datan var att lägga till eller ta bort ett slumpmässigt värde från varje pixel, att sätta varje bit av en särskild nivå till 1 och att komprimera bilden med JPEG. Resultatet av studien var att metoden som ändrade bilden direkt var mycket snabbare än metoden som först transformerade bilden och den hade också plats för mer gömd data. Injektionsmetoderna var olika bra på att skydda den gömda datan mot de olika attackerna så vilken metod som var bäst i den aspekten beror på vilken typ av attack som används.
Books on the topic "Steganografi"
Amato, Nicola. La steganografia da Erodoto a Bin Laden: Viaggio attraverso le tecniche elusive della comunicazione. 2nd ed. Genova: Italian University Press, 2009.
Find full textAmato, Nicola. La steganografia da Erodoto a Bin Laden: Viaggio attraverso le tecniche elusive della comunicazione. 2nd ed. Genova: Italian University Press, 2009.
Find full textBook chapters on the topic "Steganografi"
Gul, Gokhan, and Fatih Kurugollu. "A New Methodology in Steganalysis: Breaking Highly Undetectable Steganograpy (HUGO)." In Information Hiding, 71–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24178-9_6.
Full textConference papers on the topic "Steganografi"
Takano, Shuichi, Kiyoshi Tanaka, and Tatsuo Sugimura. "Steganograpic image transformation." In Electronic Imaging '99, edited by Ping W. Wong and Edward J. Delp III. SPIE, 1999. http://dx.doi.org/10.1117/12.344686.
Full textChurin, K., J. Preechasuk, S. Adulkasem, and C. Chantrapornchai. "Image Steganograpy via Video Using Lifting Wavelet Transform." In Security 2013. Science & Engineering Research Support soCiety, 2013. http://dx.doi.org/10.14257/astl.2013.35.11.
Full textLuo, Xiangyang, Daoshun Wang, Ping Wang, and Fenlin Liu. "Secret Key Estimation for Image Sequential Steganograph in Transform Domain." In IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference. IEEE, 2007. http://dx.doi.org/10.1109/glocom.2007.106.
Full textChen, Zhihong, and Lili Cao. "Steganograpy based on human visual system with wet paper codes." In Photonics Asia, edited by Tsutomu Shimura, Guangyu Xu, Linmi Tao, and Jesse Zheng. SPIE, 2012. http://dx.doi.org/10.1117/12.999784.
Full textGeetha, S., and S. Muthuramalingam. "A Neuro-C4.5 Paradigm for Audio Steganogram Detection Based on Asymmetric Cost of False Errors." In 2014 3rd International Conference on Eco-friendly Computing and Communication Systems (ICECCS). IEEE, 2014. http://dx.doi.org/10.1109/eco-friendly.2014.56.
Full text