Steganography Software for Hiding Message in Digital Image by using Five Modulus Method

Authors

  • Nichander Chiunata STMIK Time
  • Octara Pribadi STMIK TIME
  • Feriani Astuti Tarigan STMIK TIME

DOI:

https://doi.org/10.59934/jaiea.v5i1.1458

Keywords:

Steganography, Five Modulus Method, Text embedding, Digital image, PSNR

Abstract

Steganography is a technique for concealing information within digital media to prevent unauthorized detection. This research presents the design of a text hiding system using the Five Modulus Method (FMM) applied to digital images. The method utilizes modulus 5 operations on pixel values to embed secret messages discreetly while preserving the visual quality of the image. The developed system includes features for embedding, extracting, and comparing images to evaluate the results. The test results show that the FMM method successfully embeds text messages with minimal changes to the original image, demonstrated by PSNR values exceeding 40 dB in most tests. The extraction process also accurately retrieves the hidden messages as long as the image remains unaltered. However, this method has limitations in data capacity and is vulnerable to lossy compression. This study concludes that the FMM method is effective for hiding small to medium-sized messages and is suitable for lightweight secure communication applications.

Downloads

Download data is not yet available.

References

] S. R. G. W. S. Oman Sumantri, “102820,” vol. 67, pp. 1–7, 2015.

] D. Darwis and K. KISWORO, “Teknik Steganografi untuk Penyembunyian Pesan Teks Menggunakan Algoritma End Of File,” Explor. J. Sist. Inf. dan Telemat., vol. 8, no. 2, 2017, doi: 10.36448/jsit.v8i2.950.

] P. Hasan, S. Yunita, and D. Ariyus, “Implementasi Hill Cipher Pada Kode Telepon dan Five Modulus Method dalam Mengamankan Pesan,” Sisfotenika, vol. 10, no. 1, p. 12, 2020, doi: 10.30700/jst.v10i1.521.

] F. C. Venna, “Implementasi Steganografi Audio pada File Wav dengan metode Redundant Pattern Encoding (RPE) Berbasis Sndroid,” Repository.Uinjkt.Ac.Id, 2019, [Online]. Available: http://repository.uinjkt.ac.id/dspace/handle/123456789/47958

] S. Rahma and A. Prapanca, “Analisis Kompresi dan Dekompresi Data Teks dan Audio dengan Algoritma Run Length Encoding (RLE),” J. Informatics Comput. Sci., vol. 2, no. 04, pp. 313–320, 2021, doi: 10.26740/jinacs.v2n04.p313-320.

] A. Saefullah, Himawan, and N. Agani, “Aplikasi Steganografi Untuk Menyembunyikan Teks Dalam Media Image Dengan Menggunakan Metode LSB,” Semin. Nas. Teknol. Inf. Komun. Terap. 2012 (Semantik 2012), vol. 2012, no. Semantik, pp. 151–157, 2012.

] Asiva Noor Rachmayani, “No 主観的健康感を中心とした在宅高齢者における 健康関連指標に関する共分散構造分析Title,” p. 6, 2015.

] E. S. Wijaya and Y. Prayudi, “Konsep Hidden Message Menggunakan Teknik,” Media Inform., vol. 2, no. 1, pp. 23–38, 2004.

] M. M. T. Dr. Mars Caroline Wibowo. S.T., Teknologi Gambar Digital. 2021.

] F. N. S. Damanik, A. A. Lubis, B. E. Ezer, and H. W. Siregar, “Perbandingan Kompresi Citra Metode Five-Modulus dan Kuantisasi dengan Perbaikan Citra Histogram-Equalization,” J. SIFO Mikroskil, vol. 18, no. 1, pp. 57–70, 2017, doi: 10.55601/jsm.v18i1.435.

] F. A. Jassim, “A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method,” vol. 72, no. 17, pp. 39–44, 2013, [Online]. Available: http://arxiv.org/abs/1307.0642

] R. K. Ramesh, R. Dodmane, S. Shetty, G. Aithal, M. Sahu, and A. K. Sahu, “A Novel and Secure Fake ‑ Modulus Based Rabin ‑ Ӡ Cryptosystem,” 2023.

] S. Shah, N. Bhuiyan, N. A. Malek, O. O. Khalifa, F. Diyana, and A. Rahman, “An Improved Image Steganography Algorithm based on PVD,” vol. 10, no. 2, pp. 569–577, 2018, doi: 10.11591/ijeecs.v10.i2.pp569-577.

] M. Alanzy, R. Alomrani, B. Alqarni, and S. Almutairi, “applied sciences Image Steganography Using LSB and Hybrid Encryption Algorithms,” 2023.

] A. Durafe and V. Patidar, “Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 7, pp. 4483–4498, 2022, doi: 10.1016/j.jksuci.2020.10.008.

Downloads

Published

2025-10-15

How to Cite

Nichander Chiunata, Octara Pribadi, & Feriani Astuti Tarigan. (2025). Steganography Software for Hiding Message in Digital Image by using Five Modulus Method. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 5(1), 777–781. https://doi.org/10.59934/jaiea.v5i1.1458