REVIEW PERKEMBANGAN TEKNIK STEGANOGRAFI DALAM LAPISAN JARINGAN KOMPUTER

  • Eka Ardhianto
  • Widiyanto Tri Handoko Universitas Stikubank
  • Edy Supriyanto Universitas Stikubank

Abstract

Proses kriptografi masih sering dikombinasikan dengan steganografi dalam mekanisme pengamanan data dan penyembunyian data. Pengamanan data ini tidak hanya dilakukan pada data yang bersifat berhenti dan tersimpan pada komputer. Perkembangan teknologi komunikasi dalam jaringan memberikan revolusi dalam mengamankan data berjalan melalui saluran transmisi. Dalam paper ini dilakukan sebuah systematic literatu rereview (SLR) yang membahas perkembangan teknik steganografi data berjalan serta memberikan gambaran pengembangan penelitian untuk meningkatkan kekuatan proses pengamanan data.

References

S. Bobade dan R. Goudar, “Secure Data Communication Using Protocol Steganography in IPv6,” dalam

IEEE: 2015 International Conference on Computing Communication Control and Automation, 2015.

J. O. Seo, S. Manoharan dan A. Mahanti, “A Discussion and Review of Network Steganography,” dalam

IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 2016.

F. X. Peng, S. H. Jing dan G. H. Rong, “A New Network Steganographic Method Based in The Transverse

Multi-Protocol Collaboration,” Journal of Information Hiding and Multimedia Signal Processing, vol. 8,

no. 2, pp. 445-459, 2017.

R. Hedge dan T. H. Sreenivas, “Steganography in Ad Hoc Network,” International Journal of Computer

Science and Information Technologies, vol. 6, no. 6, pp. 5405-5408, 2015.

H. Kheddar dan M. Bouzid, “Implementation of Steganographic Method Based in IPv4 Identification Field

over NS-3,” International Journal of Engineering Research and Applications, vol. 5, no. 3, pp. 44-48,

P. Venkadesh, J. P. M. Dhas dan S. V. Divya, “Techniques to enhance security in SCTP for multi-homed

networks,” dalam IEEE : 2015 Global Conference on Communication Technologies (GCCT), 2015.

P. Gulia dan Reena, “A Novel Technique of Security Improvement in Ad-hoc Network by using FTP,”

International Journal of Applied Engineering Research, vol. 12, no. 17, pp. 6658-6662, 2017.

S. Dalal dan S. Devi, “Security Framework against Denial of Service Attacks in Wireless Mesh Network,”

Global Journal of Pure and Applied Mathematics, vol. 13, no. 2, pp. 829-837, 2017.

J. M. Kadhim dan A. E. Abed, “Steganography Using TCP/IP's Sequence Number,” Al-Nahrain Journal of

Science, vol. 20, no. 4, pp. 102-108, 2017.

Reena dan P. Gulia, “Review of Security in AD-HOC Network Using FTP,” Advances in Computational

Sciences and Technology, vol. 10, no. 5, pp. 1417-1426, 2017.

F. Shamieh dan X. Wang, “Dynamic Cross-Layer Signaling Exchange for Realtime and On Demand

Multimedia Streams,” IEEE Transactions On Multimedia, vol. 17, no. 10, pp. 1-12, 2018.

I. Ruban, N. L. Chuiko, V. Mukhin, Y. Kornaga, I. Grishko dan A. Smirnov, “The Method of Hidden

Terminal Transmission of Network Attack Signatures,” International Journal Computer Network and

Information Security, vol. 4, pp. 1-9, 2018.

B. Troegeler dan P. Watters, “Steganographic Transports: A Vector for Hidden Secret Internets?,” dalam

17th IEEE International Conference On Trust, Security And Privacy In Computing And

Communications, 2018.

K. Nair, K. Asher dan J. Joshi, “Implementing Semi-Blind Image Steganography with Improved

Concealment,” dalam IJCA Proceedings on International Conference on Computer Technology, 2015.

S. Nagendrudu dan V. R. Reddy, “Integration of BPCS Steganography and Visual Cryptography for Secure

e-Pay,” International Journal on Computer Science Engineering and Technology, vol. 5, no. 6, pp. 162-

, 2015.

G. R. Manujala dan A. Danti, “Embedding Multiple Images in A Single Image using Bit Plane Complexity

Segmentation (BPCS) Steganography,” Asian Journal of Mathematics and Computer Research, vol. 2, no.

, pp. 136-142, 2015.

I. G. Raman dan K. P. Kaliyamurthie, “An Adaptive Data Hiding Scheme for Domain Based Secret Data in

Random Order to Increase Steganography Using IWT,” International Journal Advanced Networking and

Applications, vol. 6, no. 5, pp. 2464-2467, 2015.

R. Kumar dan M. Dhiman, “Secured Image Transmission Using a Novel Neural Network Approach and

Secret Image Sharing Technique,” International Journal of Signal Processing, Image Processing and

Pattern Recognition, vol. 8, no. 1, pp. 161-192, 2015.

O. S. Adebayo, M. Olalere dan J. N. Ugwu, “Implementation of N-Cryptographic Multilevel Cryptography

Using RSA and Substitution Cryptosystem,” MIS Review, vol. 20, no. 2, pp. 57-76, 2015.

W. Mazurczyk dan L. Caviglione, “Steganography in Modern Smartphones and Mitigation Techniques,”

IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 334-357, 2015.

S. A dan K. M, “Design and Implementation of Standby Power Saving Smart Socket with Wireless Sensor

Network,” dalam 2nd Internasional Conference on Intelegent Computing, Communication & Convergance,

S. Akolkal, Y. Kokulwar, A. Neharkar dan D. Pawar, “Secure Payment System using Steganography and

Visual Cryptography,” Internasional Journal of Computing and Technology, vol. 3, no. 1, pp. 58-61, 2016.

S. S. Brar, “Double Layer Image Security System using Encryption and Steganography,” International

Journal Computer Network and Information Security, vol. 3, pp. 27-33, 2016.

K. Morovati, A. Ghorbani dan S. Kadam, “A network based document management model to prevent data

extrusion,” Computers & Security, vol. 59, pp. 71-91, 2016.

D. Demirol, R. Das dan G. Tuna, “An android application to secure text messages,” dalam IEEE 2017

International Artificial Intelligence and Data Processing Symposium (IDAP), 2017.

E. A. Hassan, H. Shareef, M. M. Islam, E. Wahyudie dan A. A. Abdrabou, “Improved Smart Power Socket

for Monitoring and Controlling Electrical Home Appliances,” IEEE Access, vol. 6, pp. 49292-49305, 2018.

R. Rahim, J. Simarta, A. Purba, M. A. Prayogi, A. Sapta, O. K. Sulaiman, M. A. Sembiring, R. Ramadhani,

A. R. S. Tambunan, H. Hasdiana, P. Simbolon, S. Aisyah, J. Juliana dan S. Suharman, “Internet based

remote desktop using INDY and socket component,” Internasional Journal of Engineering & Technology,

vol. 7, no. 29, pp. 44-47, 2018.

C. Wijayarathna dan N. A. G. Arachchilage, “Why Johnny Can’t Develop a Secure Application? A

Usability Analysis of Java Secure Socket Extension API,” Computers & Security, vol. 80, pp. 54-73, 2018.

G. Xin, Y. Liu, Y. Yang dan Y. Cao, “An Adaptive Audio Steganography for Covert Wireless

Communication,” Security and Communication Networks, vol. 2018, pp. 1-10, 2018.

Y. A. Issa, M. A. Ottom dan A. Tamrawi, “eHealth Cloud Security Challenges: A Survey,” Journal of

Healthcare Engineering, vol. 2019, pp. 1-15, 2019.

Published
2019-01-21
How to Cite
Ardhianto, E., Handoko, W., & Supriyanto, E. (2019). REVIEW PERKEMBANGAN TEKNIK STEGANOGRAFI DALAM LAPISAN JARINGAN KOMPUTER. Dinamik, 24(1), 6-12. https://doi.org/10.35315/dinamik.v24i1.7837
Section
Articles