Implementation of Format-Based Steganography Method for Secret Message Insertion in Text Media
Main Article Content
Abstract
Information security is a very important aspect in digital-based data exchange, especially to protect confidential messages from unauthorized access. In addition to cryptography techniques, steganography is another approach that aims to hide the existence of the message itself so as not to arouse suspicion. This study aims to implement and analyze format-based steganography methods in text media as a means of inserting confidential messages. The format-based method works by utilizing changes in text format, such as the use of spaces, variations in letter writing, or certain characters, without changing the meaning or readability of the original text. The research stages include the process of embedding confidential messages into the host text and the extraction process to retrieve the hidden messages. The implementation results show that secret messages can be inserted and extracted well without causing noticeable visual changes to the text, making the existence of the message difficult to detect with the naked eye. Based on these results, it can be concluded that format-based steganography in text media is a simple but effective method for maintaining the confidentiality of information in text-based communication, especially in environments where the use of multimedia media such as images or videos is not possible.
Article Details
Section
How to Cite
References
[1] T. Ismail, K. Karo, A. Fadhil Herlambang, P. A. Nurfadhilla, and M. Fachrul, “Implementasi Metode LSB (Least Significant Bit) Pada Aplikasi Steganografi Citra Untuk Pengamanan Pesan Teks,” 2026.
[2] L. Vinitha Sree, “Steganography Using Dft Based Texture Synthesis,” INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, vol. 9, p. 2, 2020, [Online]. Available: www.ijstr.org
[3] D. Sebagai et al., “STEGANOGRAFI GAMBAR MENGGUNAKAN METODE LEAST SIGNIFICANT BIT PADA CITRA DENGAN OPERASI XOR TUGAS AKHIR.”
[4] R. Munir, “07-Steganografi.”
[5] T. Rabie, “Digital Image Steganography: An FFT Approach,” in Communications in Computer and Information Science, 2012, pp. 217–230. doi: 10.1007/978-3-642-30567-2_18.
[6] S. Sundari, M. Vazira, M. Annisa Fitri, and U. Malikussaleh, “Desain dan Implementasi Aplikasi Steganografi Dual Mode Berbasis Java untuk Menyembunyikan Pesan Teks dan Gambar,” 2026.
[7] S. Hutahaean, M. Malau, and G. Siboro, “Metode Steganografi EOF untuk Penyisipan Pesan Teks Tersembunyi,” Jurnal Quancom, vol. 3, no. 1, pp. 18–24, 2025, doi: 10.62375/jqc.v3i1.434.
[8] A. H. Hasugian, I. Rusydi, and P. Apriani, “TEKNIK STEGANOGRAFI DISCRETE COSINE TRANSFORM DAN ALGORITMA RSA UNTUK MENYISIPKAN PESAN PADA AUDIO,” 2024. [Online]. Available: http://ojsamik.amikmitragama.ac.id
[9] S. K. Zhao, S. Kamal, and A. Khalid, “DEEPhide: A Text Steganography Encoder and Decoder Tool using Deep Learning,” vol. 6, no. 2, pp. 494–508, 2025, doi: 10.30880/aitcs.2025.06.02.027.
[10] V. Kozachok, A. Kozachok, S. Kopylov, and E. Pavlenko, “Steganographic System Model Based on Text Container,” 2021.
[11] M. T. Zahiran Bin Zahari Dr Nazhatul Hafizah Kamarudin, “ZAHIRAN-SEMBUNYI PESANAN TEKS RAHSIA.”
[12] J. Petrus, “Implementasi Steganografi pada Citra dengan Metode Bit-Plane Complexity Segmentation Untuk Transformasi Data”.
[13] B. Cornelius, “Makalah IF4020 Kriptografi-Teknik Informatika ITB-Semester I Tahun,” 2025.