Analisis Penerapan Metode Lossy Pada Kompresi Citra Steganografi
Keywords:Lossy, Citra, Kompresi, Steganografi, BPCS
AbstractThe internet has become a very important part of communication development in the world. Exchange of information over the internet has many advantages compared to other communication media, especially in terms of speed. But information sent via the internet, security cannot be accounted for. Tapping on confidential information, very often occurs in this communication media. Channels used by the internet are generally not safe channels. By using the lossy compression method, compression can only be applied to images that have similarities to themselves (self similiarity) so that the size of the image gets smaller and saves storage space and accelerates the sending of the image using internet media.
. Abdul Sani Sembiring, â€œAnalisis Steganografi Pada Citra Terkompresi Dengan Metode Bit-Plane Complexity Segmentation (BPCS), Cemerlang 0216 â€“ 3535, Vol 12/1-117/NOP-DES 2011
. Eiji Kawaguchi and Richard O. Eason. â€œPrinciple and applications of BPCS-Steganographyâ€, Kyushu Institute of Technology, Kitakyushu, Japan and University of Maine, Orono, Maine 04469-5708.
. Shrikant S. Khaire and DR. Sanjay L. Nalbalwar (2010). "Review: Steganography â€“ Bit Plane Complexity Segmentation (BPCS) Technique", Department of Electronics & Telecommunication, Dr. Babasaheb Ambedkar Technological University, Lonere, Dist: Raigad, Maharashtra, India. 2(9). 4860-4868.
. Sherin Jabbar and Shaiju Panchikkil. â€œLossy Compression Schemes Based On Transforms-A Literature Review On Medical Imagesâ€, Department of Computer Engineering, MES Engineering College, Kuttippuram, Kerala, International Journal of Advanced Information Technology (IJAIT) Vol. 2, No.6, December 2012
. Mulyanto Edy, S.Si., M.Kom. (2009), â€œ Teori Pengolahan Citraâ€, Jogjakarta : Penerbit Andi.
. Miano and John (1999). â€œCompressed Image File Format JPEG, PNG, GIF, XBM, BMPâ€ Addison Wesley Longman, Inc.
. Negnevitsky Michael (2002), â€œArtificial Intelligence : A Guide to Intelligence Systemâ€, Enggland: Addison-Wesley.
. Dony Ariyus (2006),â€Computer Securityâ€,Yogyakarta :Andi Offset.
How to Cite
Copyright (c) 2018 Media Informasi Analisa dan Sistem
This work is licensed under a Creative Commons Attribution 4.0 International License.