REVIEW PERKEMBANGAN TEKNIK STEGANOGRAFI DALAM LAPISAN JARINGAN KOMPUTER
Abstract
Proses kriptografi masih sering dikombinasikan dengan steganografi dalam mekanisme pengamanan data dan penyembunyian data. Pengamanan data ini tidak hanya dilakukan pada data yang bersifat berhenti dan tersimpan pada komputer. Perkembangan teknologi komunikasi dalam jaringan memberikan revolusi dalam mengamankan data berjalan melalui saluran transmisi. Dalam paper ini dilakukan sebuah systematic literatu rereview (SLR) yang membahas perkembangan teknik steganografi data berjalan serta memberikan gambaran pengembangan penelitian untuk meningkatkan kekuatan proses pengamanan data.
References
S. Bobade dan R. Goudar, “Secure Data Communication Using Protocol Steganography in IPv6,” dalam
IEEE: 2015 International Conference on Computing Communication Control and Automation, 2015.
J. O. Seo, S. Manoharan dan A. Mahanti, “A Discussion and Review of Network Steganography,” dalam
IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 2016.
F. X. Peng, S. H. Jing dan G. H. Rong, “A New Network Steganographic Method Based in The Transverse
Multi-Protocol Collaboration,” Journal of Information Hiding and Multimedia Signal Processing, vol. 8,
no. 2, pp. 445-459, 2017.
R. Hedge dan T. H. Sreenivas, “Steganography in Ad Hoc Network,” International Journal of Computer
Science and Information Technologies, vol. 6, no. 6, pp. 5405-5408, 2015.
H. Kheddar dan M. Bouzid, “Implementation of Steganographic Method Based in IPv4 Identification Field
over NS-3,” International Journal of Engineering Research and Applications, vol. 5, no. 3, pp. 44-48,
P. Venkadesh, J. P. M. Dhas dan S. V. Divya, “Techniques to enhance security in SCTP for multi-homed
networks,” dalam IEEE : 2015 Global Conference on Communication Technologies (GCCT), 2015.
P. Gulia dan Reena, “A Novel Technique of Security Improvement in Ad-hoc Network by using FTP,”
International Journal of Applied Engineering Research, vol. 12, no. 17, pp. 6658-6662, 2017.
S. Dalal dan S. Devi, “Security Framework against Denial of Service Attacks in Wireless Mesh Network,”
Global Journal of Pure and Applied Mathematics, vol. 13, no. 2, pp. 829-837, 2017.
J. M. Kadhim dan A. E. Abed, “Steganography Using TCP/IP's Sequence Number,” Al-Nahrain Journal of
Science, vol. 20, no. 4, pp. 102-108, 2017.
Reena dan P. Gulia, “Review of Security in AD-HOC Network Using FTP,” Advances in Computational
Sciences and Technology, vol. 10, no. 5, pp. 1417-1426, 2017.
F. Shamieh dan X. Wang, “Dynamic Cross-Layer Signaling Exchange for Realtime and On Demand
Multimedia Streams,” IEEE Transactions On Multimedia, vol. 17, no. 10, pp. 1-12, 2018.
I. Ruban, N. L. Chuiko, V. Mukhin, Y. Kornaga, I. Grishko dan A. Smirnov, “The Method of Hidden
Terminal Transmission of Network Attack Signatures,” International Journal Computer Network and
Information Security, vol. 4, pp. 1-9, 2018.
B. Troegeler dan P. Watters, “Steganographic Transports: A Vector for Hidden Secret Internets?,” dalam
17th IEEE International Conference On Trust, Security And Privacy In Computing And
Communications, 2018.
K. Nair, K. Asher dan J. Joshi, “Implementing Semi-Blind Image Steganography with Improved
Concealment,” dalam IJCA Proceedings on International Conference on Computer Technology, 2015.
S. Nagendrudu dan V. R. Reddy, “Integration of BPCS Steganography and Visual Cryptography for Secure
e-Pay,” International Journal on Computer Science Engineering and Technology, vol. 5, no. 6, pp. 162-
, 2015.
G. R. Manujala dan A. Danti, “Embedding Multiple Images in A Single Image using Bit Plane Complexity
Segmentation (BPCS) Steganography,” Asian Journal of Mathematics and Computer Research, vol. 2, no.
, pp. 136-142, 2015.
I. G. Raman dan K. P. Kaliyamurthie, “An Adaptive Data Hiding Scheme for Domain Based Secret Data in
Random Order to Increase Steganography Using IWT,” International Journal Advanced Networking and
Applications, vol. 6, no. 5, pp. 2464-2467, 2015.
R. Kumar dan M. Dhiman, “Secured Image Transmission Using a Novel Neural Network Approach and
Secret Image Sharing Technique,” International Journal of Signal Processing, Image Processing and
Pattern Recognition, vol. 8, no. 1, pp. 161-192, 2015.
O. S. Adebayo, M. Olalere dan J. N. Ugwu, “Implementation of N-Cryptographic Multilevel Cryptography
Using RSA and Substitution Cryptosystem,” MIS Review, vol. 20, no. 2, pp. 57-76, 2015.
W. Mazurczyk dan L. Caviglione, “Steganography in Modern Smartphones and Mitigation Techniques,”
IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 334-357, 2015.
S. A dan K. M, “Design and Implementation of Standby Power Saving Smart Socket with Wireless Sensor
Network,” dalam 2nd Internasional Conference on Intelegent Computing, Communication & Convergance,
S. Akolkal, Y. Kokulwar, A. Neharkar dan D. Pawar, “Secure Payment System using Steganography and
Visual Cryptography,” Internasional Journal of Computing and Technology, vol. 3, no. 1, pp. 58-61, 2016.
S. S. Brar, “Double Layer Image Security System using Encryption and Steganography,” International
Journal Computer Network and Information Security, vol. 3, pp. 27-33, 2016.
K. Morovati, A. Ghorbani dan S. Kadam, “A network based document management model to prevent data
extrusion,” Computers & Security, vol. 59, pp. 71-91, 2016.
D. Demirol, R. Das dan G. Tuna, “An android application to secure text messages,” dalam IEEE 2017
International Artificial Intelligence and Data Processing Symposium (IDAP), 2017.
E. A. Hassan, H. Shareef, M. M. Islam, E. Wahyudie dan A. A. Abdrabou, “Improved Smart Power Socket
for Monitoring and Controlling Electrical Home Appliances,” IEEE Access, vol. 6, pp. 49292-49305, 2018.
R. Rahim, J. Simarta, A. Purba, M. A. Prayogi, A. Sapta, O. K. Sulaiman, M. A. Sembiring, R. Ramadhani,
A. R. S. Tambunan, H. Hasdiana, P. Simbolon, S. Aisyah, J. Juliana dan S. Suharman, “Internet based
remote desktop using INDY and socket component,” Internasional Journal of Engineering & Technology,
vol. 7, no. 29, pp. 44-47, 2018.
C. Wijayarathna dan N. A. G. Arachchilage, “Why Johnny Can’t Develop a Secure Application? A
Usability Analysis of Java Secure Socket Extension API,” Computers & Security, vol. 80, pp. 54-73, 2018.
G. Xin, Y. Liu, Y. Yang dan Y. Cao, “An Adaptive Audio Steganography for Covert Wireless
Communication,” Security and Communication Networks, vol. 2018, pp. 1-10, 2018.
Y. A. Issa, M. A. Ottom dan A. Tamrawi, “eHealth Cloud Security Challenges: A Survey,” Journal of
Healthcare Engineering, vol. 2019, pp. 1-15, 2019.