Analysis of Most Significant Bit (MSB) Steganography Method in an IoT-Based Keyboard Learning System

Authors

  • Darinda Sofia Tanjung Universitas Katolik Santo Thomas, Indonesia
  • Yunita Sari Siregar Politeknik Negeri Medan, Indonesia
  • Juliana Universitas Katolik Santo Thomas, Indonesia

DOI:

https://doi.org/10.47709/brilliance.v5i1.5179

Keywords:

Steganography, Most Significant Bit (MSB), Internet of Things (IoT), Data Security, Learning System, Sensor

Abstract

The advancement of digital technology has driven the development of Internet of Things (IoT)-based learning systems to enhance efficiency and interactivity in the teaching and learning process.  IoT implementations is the development of a sensor-based keyboard learning system. This system is designed to help users improve their typing skills through monitoring parameters such as typing speed, keypress patterns, and usage duration. This data becomes an important asset that requires protection due to its connection to user privacy and personal performance evaluation. In IoT-based systems, data is typically transmitted through networks that are potentially vulnerable to security threats, such as eavesdropping, modification, or theft of data or information. The development of this system is carried out in a sensor-based keyboard learning application with IoT integration, which is equipped with data security features using steganography techniques. Steganography is a technique used to hide data or information within a digital medium so that it cannot be accessed by others. The method used is the  Most Significant Bit (MSB), a simple steganography algorithm that utilizes significant bits from image files to embed secret messages. This research aims to analyze the effectiveness of the MSB method in protecting user data stored and transmitted through IoT system. The implementation is carried out on a sensor-based keyboard learning system, where the data collected from the sensors is used to track typing speed, keypress patterns, and typing duration. This data is encrypted using MSB steganography and embedded into a cover image before being transmitted through the IoT network.

References

Al Rozi, U., Indrawati, C. D. S., & Widodo, J. (2018). Pemanfaatan program aplikasi typing master untuk meningkatkan kecepatan mengetik siswa SMK Wikarya Karanganyar Tahun 2018/2019. Jikap, 2(4), 91–100. Retrieved from https://jurnal.uns.ac.id/JIKAP/article/download/38165/25178

Anwar, S. (2017). Implementasi Pengamanan Data Dan Informasi Dengan Metode Steganografi LSB Dan Algoritma Kriptografi AES. Jurnal Format, 6(1), 65–74.

Febriani, S. R., & Irawati, D. C. (2016). Implementasi Digital Watermarking Pada Citra Menggunakan Metode Least Significant Bit. Jurnal Informatika Dan Komputer, 21(3), 8–18. Retrieved from https://ejournal.gunadarma.ac.id/index.php/infokom/article/download/1522/128

Permana, A. A. (2021). Pengamanan Pesan Menggunakan Teknik Steganografi Dengan Algoritma Least Significant Bit (Lsb). Jurnal Algoritma, Logika Dan Komputasi, 3(2), 291–298. https://doi.org/10.30813/j-alu.v3i2.2477

Permana, A. A., & Amna, H. (2022). Implementasi Steganografi File Citra Digital Menggunakan Metode Least Significant Bit. Jurnal Teknik, 11(1), 62–72. https://doi.org/10.31000/jt.v11i1.6161

Rahmatsyah, I., Siregar, Y. S., & Khairunnisa. (2024). Proteksi Keamanan Data dengan Menerapkan Algoritma Bacon Cipher dan ROT128. Journal of Computer Science and Information Technology, 4(1), 34–41. Retrieved from https://journal.fkpt.org/index.php/Explorer/article/view/1099

Ramadhani, R., Siregar, D., & Siregar, Y. S. (2018). Implementasi Steganografi Menggunakan Algoritma Diversity Pada Citra Digital. Jurnal Teknologi Dan Ilmu Komputer Prima (JUTIKOMP), 1(1), 102–114. https://doi.org/10.34012/jutikomp.v1i1.337

Ratnasari, A. P., & Dwiyanto, F. A. (2020). Metode Steganografi Citra Digital. Sains, Aplikasi, Komputasi Dan Teknologi Informasi, 2(2), 52. https://doi.org/10.30872/jsakti.v2i2.3300

Ro’isa, F., & Suartana, I. M. (2019). Implementasi Steganografi dengan Menggunakan Metode Masking and Filtering untuk Menyisipkan Gambar ke dalam Citra Digital. Journal of Informatics and Computer Science (JINACS), 1(01), 9–15. https://doi.org/10.26740/jinacs.v1n01.p9-15

Rosmala, D., & K, A. K. (2018). Perbandingan Metode Most Significant Bit dan Least Significant Bit pada Steganografi untuk Keamanan Data Media Digital. MIND Journal, 3(2), 36–46. https://doi.org/10.26760/mindjournal.v3i2.36-46

Setiawan, Z., Hiswara, A., & Muthmainah, H. N. (2023). Mengoptimalkan Jaringan Sensor Nirkabel dalam Aplikasi Monitor Lingkungan dengan Teknologi IoT di Indonesia. Jurnal Multidisiplin West Science, 2(10), 858–867. https://doi.org/10.58812/jmws.v2i10.704

Setyansyah, R., Siregar, Y. S., & Khairani, M. (2019). Noise Removal Pada Citra Digital Dengan Menggunakan Metode Active Contour. ALGORITMA: Jurnal Ilmu Komputer Dan Informatika, 5(1), 978–979. Retrieved from http://www.seminar.ilkom.unsri.ac.id/index.php/ars/article/view/2130

Soambaton, M. F., Djuniadi, D., & Al-Azhari, A. H. (2024). MONITORING KOLAM IKAN NILA BERBASIS IoT DENGAN SENSOR AMONIA, SUHU, KETINGGIAN, DAN PH. Jurnal Informatika Dan Teknik Elektro Terapan, 12(2), 919–926. https://doi.org/10.23960/jitet.v12i2.4021

Syahputra, A., Khairani, M., & Siregar, Y. S. (2023). PERANCANGAN WEB SERVER DAN PROXY SERVER DENGAN SISTEM OPERASI. 9(4), 34–43.

Wahyuningsih, S., Pandex, T. V. D., & Stefanny, V. (2017). Implementasi Visible Watermarking Dan Steganografi Least Significant Bit Pada File Citra Digital. Jurnal TELEMATIKA MKOM, 8(2), 140–145.

Yanti, F., & Budayawan, K. (2023). Implementasi Steganografi Menggunakan Metode Least Significant Bit (LSB) dalam Pengamanan Informasi pada Citra Digital. Voteteknika (Vocational Teknik Elektronika Dan Informatika), 11(1), 63. https://doi.org/10.24036/voteteknika.v11i1.121968

Zaini, N. (2024). Implementasi Internet of Things Pada Prototype. 2(1), 357–362.

Downloads

Published

2025-04-08

How to Cite

Darinda Sofia Tanjung, Sari Siregar, Y., & Juliana, J. (2025). Analysis of Most Significant Bit (MSB) Steganography Method in an IoT-Based Keyboard Learning System. Brilliance: Research of Artificial Intelligence, 5(1), 37–43. https://doi.org/10.47709/brilliance.v5i1.5179

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.