Semi-public watermarking digital implementation in the concealment of text messages

  • Noferianto Sitompul Multimedia Engineering Study Program, Department of Informatics Management, Politeknik Negeri Sambas
  • Maranata Pasaribu Informatics Engineering Study Program, Akademi Manajemen Informatika dan Komputer Medan Business Polytechnic (MBP)
Keywords: Digital semi-public watermarking, cover message, step message, watermarking

Abstract

The purpose of this study is to generate watermarking of an input image. The watermarking process will begin with the process of reading color image pixels. After that, the process will be continued by calculating the step message value inserted and inserting all the necessary values in the watermarking checking process. In the event of an attack, then at the time of watermarking formation, a specific noise value (randomly generated) will be calculated to be inserted into the image. After the process of watermarking formation, then the process can be continued with checking watermarking and extracting messages.

References

[1] S. R. Febriani, “Implementasi Digital Watermarking pada Citra Menggunakan Metode Least Significant Bit,” vol. 21, no. 3, pp. 8–18, 2016.
[2] E. Y. Reva, B. Susilo, and E. P. Purwandari, “Aplikasi Watermark Pada Citra Digital Menggunakan Kombinasi Metode Discrete Cosine Transform , Discrete Wavelet Transform Dan Singular Value Decomposition,” J. Rekursif, vol. 4, no. 2, pp. 152–160, 2016, [Online]. Available: ejournal.unib.ac.id.
[3] K. Firdausy, I. Hawariyanta, and M. Murinto, “IMPLEMENTASI WATERMARKING UNTUK PENYEMBUNYIAN DATA PADA CITRA DALAM DOMAIN FREKUENSI MENGGUNAKAN DISCRETE COSINE TRANSFORM,” TELKOMNIKA (Telecommunication Comput. Electron. Control., 2006, doi: 10.12928/telkomnika.v4i1.1240.
[4] T. N. Turnip, J. Doloksaribu, V. Purba, and I. Saragih, “Pengaruh Kapasitas Dimensi Citra Watermark terhadap Audio Watermarking dengan Perpaduan Metode DWT (Discrete Wavelet Transform) dan SVD ( Singular Value Decomposition),” J. Teknol. Inf. dan Ilmu Komput., vol. 6, no. 2, p. 141, 2019, doi: 10.25126/jtiik.2019621269.
[5] Y. HAFIZHANA, I. SAFITRI, L. NOVAMIZANTI, and N. IBRAHIM, “Image Watermarking pada Citra Medis menggunakan Compressive Sensing berbasis Stationary Wavelet Transform,” ELKOMIKA J. Tek. Energi Elektr. Tek. Telekomun. Tek. Elektron., vol. 8, no. 1, p. 43, 2020, doi: 10.26760/elkomika.v8i1.43.
[6] A. Abdussalam, E. Hari Rachmawanto, A. S. Noor, D. R. Ignatius Moses Setiadi, and C. Atika Sari, “Optimasi Keamanan Watermarking pada Daubechies Transform Berbasis Arnold Cat Map,” J. Inform. J. Pengemb. IT, vol. 4, no. 1, pp. 31–37, 2019, doi: 10.30591/jpit.v4i1.911.
[7] H. Nuryadi, “Watermarking Dengan Qrcode Digunakan Untuk Verifikasi Pada Website,” J. Sist. Inf. Univ. Suryadarma, vol. 4, no. 2, pp. 34–41, 2014, doi: 10.35968/jsi.v4i2.4.
[8] S. Syamsuryadi and I. Aqil, “Watermarking Video Menggunakan Metode Transformasi Wavelet Diskrit,” J. Ilm. Inform. Glob., vol. 9, no. 2, pp. 90–94, 2019, doi: 10.36982/jig.v9i2.562.
[9] A. Suheryadi, “Penerapan Digital Watermark Sebagai Validasi Keabsahan Gambar Digital Dengan Skema Blind Watermark,” JTT (Jurnal Teknol. Ter., vol. 3, no. 2, pp. 1–6, 2017, doi: 10.31884/jtt.v3i2.54.
[10] J. Rosmiyati and T. M. S. Mulyana, “Watermark Dengan Gabungan Steganografi Dan Visible Watermarking,” J. Algoritm. Log. dan Komputasi, vol. 1, no. 1, pp. 36–43, 2018, doi: 10.30813/j-alu.v1i1.1109.
Published
2021-03-30
How to Cite
Sitompul, N., & Maranata Pasaribu. (2021). Semi-public watermarking digital implementation in the concealment of text messages. Jurnal Info Sains : Informatika Dan Sains, 11(1), 5-10. Retrieved from http://seaninstitute.org/infor/index.php/JIS/article/view/109