STEGANOGRAPHY CAPACITY ANALYSIS OF TEXT IN TEXT WITH SENTENCE STRUCTURE IN INDONESIAN
DOI:
https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i1.2863Keywords:
Steganografi Teks, Pola Kalimat, Payload Balancing CapacityAbstract
Data security issues become very important when the computer has been used as a communication tool on a global network (internet). One method that is quite popular for securing data from irresponsible parties is text-based steganography, where confidential data or information is hidden or inserted into other text media so as not to arouse suspicion from other parties. Based on the input data calculated on the number of words, it has a significant influence on the results of the stegotext. This can be seen from the comparison of the length of the input message which is calculated in the number of words with the length of the output message (stegoteks) which is influenced by the length of the style (pattern) of the sentence structure used. For input data with a word length of 1, the average capacity of the stegotext is 8 to 9 words or 12.4%, for input word length 2, the average capacity of the stegotext is 22 words or 8.85% and the input word length is 4 then the capacity of the stegotext is between 30 to 33 words or equivalent to 12.91%.
Keywords :Text Steganography; Sentence Pattern; Payload Balancing Capacity
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 R. Fanry Siahaan, Amran Sitohang, Ibnu Febrian, Widia Putri
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish their manuscripts through the Journal of Information Systems and Computer Science agree to the following:
- Copyright to the manuscripts of scientific papers in this Journal is held by the author.
- The author surrenders the rights when first publishing the manuscript of his scientific work and simultaneously the author grants permission / license by referring to the Creative Commons Attribution-ShareAlike 4.0 International License to other parties to distribute his scientific work while still giving credit to the author and the Journal of Information Systems and Computer Science as the first publication medium for the work.
- Matters relating to the non-exclusivity of the distribution of the Journal that publishes the author's scientific work can be agreed separately (for example: requests to place the work in the library of an institution or publish it as a book) with the author as one of the parties to the agreement and with credit to sJournal of Information Systems and Computer Science as the first publication medium for the work in question.
- Authors can and are expected to publish their work online (e.g. in a Repository or on their Organization's/Institution's website) before and during the manuscript submission process, as such efforts can increase citation exchange earlier and with a wider scope.