TINJAUAN ONTOLOGI, EPISTEMOLOGI, DAN AKSIOLOGI DALAM BIDANG ILMU STEGANOGRAFI
Abstract
Abstract: Steganography is a field of science that studies the technique of hiding information in digital media to protect data from third-party detection ketiga (Atawneh et al., 2013; Michaylov & Sarmah, 2024; Sitompul et al., 2018). This article reviews steganography through three philosophical perspectives: ontology, epistemology, and axiology. Ontologically, steganography explains the existence of hidden information in host media and its interactions. Epistemology plays a role in the process of developing and validating knowledge related to hiding and detection techniques. Meanwhile, axiology highlights the ethical benefits and risks, including the use to protect privacy and the potential for misuse in cybercrime. Steganography, with this comprehensive understanding, plays an important role in data security and information technology.
Keywords: Steganography, Ontology, Epistemology, and Axiology
Abstrak: Steganografi adalah bidang ilmu yang mempelajari teknik penyembunyian informasi di dalam media digital untuk melindungi data dari deteksi pihak ketiga (Atawneh et al., 2013; Michaylov & Sarmah, 2024; Sitompul et al., 2018). Artikel ini meninjau steganografi melalui tiga perspektif filosofis: ontologi, epistemologi, dan aksiologi. Secara ontologis, steganografi menjelaskan keberadaan informasi tersembunyi dalam media host dan interaksinya. Epistemologi berperan dalam proses pengembangan dan validasi pengetahuan terkait teknik penyembunyian dan deteksi. Sementara itu, aksiologi menyoroti manfaat dan risiko etis, termasuk penggunaan untuk melindungi privasi dan potensi penyalahgunaan dalam kejahatan siber. Steganografi, dengan pemahaman komprehensif ini, berperan penting dalam keamanan data dan teknologi informasi.
Kata kunci: Steganografi, Ontologi, Epistemologi, dan Aksiologi
Full Text:
PDFReferences
Atawneh, S., Almomani, A., & Sumari, P. (2013). Steganography in digital images: Common approaches and tools. IETE Technical Review, 30(4), 344. https://doi.org/10.4103/0256-4602.116724
Bonavoglia, P. (2022). The ciphers of the Republic of Venice an overview. Cryptologia, 46(4), 323–346. https://doi.org/10.1080/01611194.2021.1901797
Dehshibi, M. M., Shanbehzadeh, J., & Pedram, M. M. (2018). A robust image-based cryptology scheme based on cellular non-linear network and local image descriptors. International Journal of Parallel, Emergent and Distributed Systems, 35(5), 514–534. https://doi.org/10.1080/17445760.2018.1510929
Dutta, H., Das, R. K., Nandi, S., & Prasanna, S. R. M. (2020). An Overview of Digital Audio Steganography. IETE Technical Review, 37(6), 632–650. https://doi.org/10.1080/02564602.2019.1699454
Fyffe, B., Wang, Y., & Duncan, I. (2019). Human visual based perception of steganographic images. Journal of Cyber Security Technology, 3(2), 61–107. https://doi.org/10.1080/23742917.2019.1609393
Jeevan, K. M., & Krishnakumar, S. (2019). Image hiding technique using a pseudo hexagonal structure approach. International Journal of Computers and Applications, 41(5), 359–366. https://doi.org/10.1080/1206212X.2018.1438037
Jeevitha, S., & Amutha Prabha, N. (2018). A COMPREHENSIVE REVIEW ON STEGANOGRAPHIC TECHNIQUES AND IMPLEMENTATION. ARPN Journal of Engineering and Applied Sciences, 13(17). www.arpnjournals.com
Karampidis, K., Kavallieratou, E., & Papadourakis, G. (2018). A review of image steganalysis techniques for digital forensics. Journal of Information Security and Applications, 40, 217–235. https://doi.org/10.1016/j.jisa.2018.04.005
Kaur Brar, R., & Sharma, A. (2018). A Review on Steganography. International Journal of Computer and Information Technology, 7(1), 45–48. www.ijcit.com
Klubsuwan, K., & Mungsing, S. (2009). Digital data security and hiding on virtual reality video 3D GIS. International Journal of Management Science and Engineering Management, 4(3), 163–176. https://doi.org/10.1080/17509653.2009.10684575
M, H. F., I, E. H., & A, A. A. (2019). Internet of Things Applications and its Security. International Journal of Computer Applications, 182(41), 9–11. www.ijcaonline.org
Mahajan, P. (2014). Steganography: A Data Hiding Technique. International Journal of Advanced Research in Computer Science and Software Engineering, 4(11), 759–763. https://www.researchgate.net/publication/344412253
Majeed, M. A., Sulaiman, R., Shukur, Z., & Hasan, M. K. (2021). A Review on Text Steganography Techniques. Mathematics, 9(21), 2829. https://doi.org/10.3390/math9212829
Michaylov, K. D., & Sarmah, D. K. (2024). Steganography and steganalysis for digital image enhanced Forensic analysis and recommendations. Journal of Cyber Security Technology, 1–27. https://doi.org/10.1080/23742917.2024.2304441
Mukherjee, S., & Sanyal, G. (2017). Enhanced Position Power First Mapping (PPFM) based image steganography. International Journal of Computers and Applications, 39(2), 59–68. https://doi.org/10.1080/1206212X.2016.1273624
Mythreyi, S., & Vaidehi, V. (2007). Gabor Transform based Image Steganography. IETE Journal of Research, 53(2), 103–112. https://doi.org/10.1080/03772063.2007.10876126
Nasution, M. K. M., Hidayat, R., & Syah, R. (2022). Computer Science. International Journal on Advanced Science, Engineering and Information Technology, 12(3), 1142. https://doi.org/10.18517/ijaseit.12.3.14832
Nasution, M. K. M., Onrizal, & Aulia, I. (2019). Design of the research problem statement. Journal of Physics: Conference Series, 1235(1), 012115. https://doi.org/10.1088/1742-6596/1235/1/012115
Nasution, M. K. M., Sitompul, O. S., Elveny, M., & Syah, R. (2021). Data science: A Review towards the Big Data Problems. Journal of Physics: Conference Series, 1898(1), 012006. https://doi.org/10.1088/1742-6596/1898/1/012006
Pal, S. K., & Madhavan, C. E. V. (2002). Investigating Steganographic Communications. IETE Technical Review, 19(4), 207–212. https://doi.org/10.1080/02564602.2002.11417033
Po-Hsian, H. (2010). A weight-based data hiding method for binary image using selective binary numeral system. Journal of Discrete Mathematical Sciences and Cryptography, 13(5), 429–444. https://doi.org/10.1080/09720529.2010.10698305
Rao, N. V., & Pandit, S. N. N. (2007). Multimedia Digital Rights Protection Using Watermarking Techniques. Information Systems Security, 16(2), 93–99. https://doi.org/10.1080/10658980701322528
Ratan, R., & Veni Madhavan, C. E. (2002). Steganography based Information Security. In IETE Technical Review (Vol. 19, Issue 4).
Rushdi, A. M., & Ba-rukab, O. M. (2005). Fault-tree modelling of computer system security. International Journal of Computer Mathematics, 82(7), 805–819. https://doi.org/10.1080/00207160412331336017
Saad Ahmed, S., Memon, M., Jaffari, R., & Jawaid, M. (2021). StegoBound: A Novel Image Steganography Technique Using Boundary-Based LSB Substitution. Journal of Hunan University Natural Sciences, 48(6), 153–163.
Sairam, T. D., & Boopathybagan, K. (2019). Computational intelligence-based steganalysis comparison for RCM-DWT and PVA-MOD methods. Automatika, 60(3), 285–293. https://doi.org/10.1080/00051144.2019.1579434
Sathisha, N., Kasukurthi Suresh, B., B, R. K., & Patnaik, L. M. (2011). EMBEDDING INFORMATION IN DCT COEFFICIENTS BASED ON AVERAGE COVARIANCE. International Journal of Engineering Science and Technology, 3(4), 3184–3194. https://www.researchgate.net/publication/266333755
Singh, A., & Singh, S. (2013). A Review on the Various Recent Steganography Techniques. IJCSN International Journal of Computer Science and Network, 2(6), 142–156. www.IJCSN.org
Singh, N., & Todwal, V. (2018). A Review of Steganography. International Journal of Innovative Science and Research Technology, 3(1), 723–728. www.ijisrt.com
Singh, S., & Singh, A. (2014). An Information Security Technique Using DES-RSA Hybrid and LSB. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), 355(14), 187–192. https://www.researchgate.net/publication/278329872
Sirisha, B. L., Kumar, S. S., & Mohan, B. C. (2018). Secret image sharing using eigenvalues and eigenvectors. Journal of Information and Optimization Sciences, 39(4), 871–878. https://doi.org/10.1080/02522667.2017.1383659
Sitompul, O. S., Naibaho, F. R., Situmorang, Z., & Nababan, E. B. (2018). Steganography with Highly Random Linear Congruential Generator for Security Enhancement. 2018 Third International Conference on Informatics and Computing (ICIC), 1–6. https://doi.org/10.1109/IAC.2018.8780445
Srinivasan, K., Gowthaman, T., & Kanakaraj, J. (2017). A novel copyright marking approach using steganography and robust RSA asymmetric-key cryptographic technique in audio files. Journal of Discrete Mathematical Sciences and Cryptography, 20(8), 1563–1571. https://doi.org/10.1080/09720529.2017.1402575
Venukumar, V., & Pathari, V. (2016). A survey of applications of threshold cryptography—proposed and practiced. Information Security Journal: A Global Perspective, 25(4–6), 180–190. https://doi.org/10.1080/19393555.2016.1251996
Wijaya, B. A., Nasution, M. K. M., & Zamzami, E. M. (2018). The steganographic video analysis uses combination of discrete cosine transform and discrete wavelet transform algorithms. Journal of Physics: Conference Series, 1116(2), 022046. https://doi.org/10.1088/1742-6596/1116/2/022046
Yasin, V., Zarlis, M., & Nasution, M. K. M. (2018). FILSAFAT LOGIKA DAN ONTOLOGI ILMU KOMPUTER. Journal of Information System, Applied, Management, Accounting and Research, 2(2), 68–75. http://journal.stmikjayakarta.ac.id/index.php/jisamar
DOI: https://doi.org/10.54314/jssr.v8i1.2481
Article Metrics
Abstract view : 38 timesPDF - 20 times
Copyright (c) 2025 JOURNAL OF SCIENCE AND SOCIAL RESEARCH