TINJAUAN ONTOLOGI, EPISTEMOLOGI, DAN AKSIOLOGI DALAM BIDANG ILMU STEGANOGRAFI

Frainskoy Rio Naibaho

Abstract


Abstract: Steganography is a field of science that studies the technique of hiding information in digital media to protect data from third-party detection ketiga (Atawneh et al., 2013; Michaylov & Sarmah, 2024; Sitompul et al., 2018). This article reviews steganography through three philosophical perspectives: ontology, epistemology, and axiology. Ontologically, steganography explains the existence of hidden information in host media and its interactions. Epistemology plays a role in the process of developing and validating knowledge related to hiding and detection techniques. Meanwhile, axiology highlights the ethical benefits and risks, including the use to protect privacy and the potential for misuse in cybercrime. Steganography, with this comprehensive understanding, plays an important role in data security and information technology.

Keywords: Steganography, Ontology, Epistemology, and Axiology

Abstrak: Steganografi adalah bidang ilmu yang mempelajari teknik penyembunyian informasi di dalam media digital untuk melindungi data dari deteksi pihak ketiga (Atawneh et al., 2013; Michaylov & Sarmah, 2024; Sitompul et al., 2018). Artikel ini meninjau steganografi melalui tiga perspektif filosofis: ontologi, epistemologi, dan aksiologi. Secara ontologis, steganografi menjelaskan keberadaan informasi tersembunyi dalam media host dan interaksinya. Epistemologi berperan dalam proses pengembangan dan validasi pengetahuan terkait teknik penyembunyian dan deteksi. Sementara itu, aksiologi menyoroti manfaat dan risiko etis, termasuk penggunaan untuk melindungi privasi dan potensi penyalahgunaan dalam kejahatan siber. Steganografi, dengan pemahaman komprehensif ini, berperan penting dalam keamanan data dan teknologi informasi.

Kata kunci: Steganografi, Ontologi, Epistemologi, dan Aksiologi


Full Text:

PDF

References


Atawneh, S., Almomani, A., & Sumari, P. (2013). Steganography in digital images: Common approaches and tools. IETE Technical Review, 30(4), 344. https://doi.org/10.4103/0256-4602.116724

Bonavoglia, P. (2022). The ciphers of the Republic of Venice an overview. Cryptologia, 46(4), 323–346. https://doi.org/10.1080/01611194.2021.1901797

Dehshibi, M. M., Shanbehzadeh, J., & Pedram, M. M. (2018). A robust image-based cryptology scheme based on cellular non-linear network and local image descriptors. International Journal of Parallel, Emergent and Distributed Systems, 35(5), 514–534. https://doi.org/10.1080/17445760.2018.1510929

Dutta, H., Das, R. K., Nandi, S., & Prasanna, S. R. M. (2020). An Overview of Digital Audio Steganography. IETE Technical Review, 37(6), 632–650. https://doi.org/10.1080/02564602.2019.1699454

Fyffe, B., Wang, Y., & Duncan, I. (2019). Human visual based perception of steganographic images. Journal of Cyber Security Technology, 3(2), 61–107. https://doi.org/10.1080/23742917.2019.1609393

Jeevan, K. M., & Krishnakumar, S. (2019). Image hiding technique using a pseudo hexagonal structure approach. International Journal of Computers and Applications, 41(5), 359–366. https://doi.org/10.1080/1206212X.2018.1438037

Jeevitha, S., & Amutha Prabha, N. (2018). A COMPREHENSIVE REVIEW ON STEGANOGRAPHIC TECHNIQUES AND IMPLEMENTATION. ARPN Journal of Engineering and Applied Sciences, 13(17). www.arpnjournals.com

Karampidis, K., Kavallieratou, E., & Papadourakis, G. (2018). A review of image steganalysis techniques for digital forensics. Journal of Information Security and Applications, 40, 217–235. https://doi.org/10.1016/j.jisa.2018.04.005

Kaur Brar, R., & Sharma, A. (2018). A Review on Steganography. International Journal of Computer and Information Technology, 7(1), 45–48. www.ijcit.com

Klubsuwan, K., & Mungsing, S. (2009). Digital data security and hiding on virtual reality video 3D GIS. International Journal of Management Science and Engineering Management, 4(3), 163–176. https://doi.org/10.1080/17509653.2009.10684575

M, H. F., I, E. H., & A, A. A. (2019). Internet of Things Applications and its Security. International Journal of Computer Applications, 182(41), 9–11. www.ijcaonline.org

Mahajan, P. (2014). Steganography: A Data Hiding Technique. International Journal of Advanced Research in Computer Science and Software Engineering, 4(11), 759–763. https://www.researchgate.net/publication/344412253

Majeed, M. A., Sulaiman, R., Shukur, Z., & Hasan, M. K. (2021). A Review on Text Steganography Techniques. Mathematics, 9(21), 2829. https://doi.org/10.3390/math9212829

Michaylov, K. D., & Sarmah, D. K. (2024). Steganography and steganalysis for digital image enhanced Forensic analysis and recommendations. Journal of Cyber Security Technology, 1–27. https://doi.org/10.1080/23742917.2024.2304441

Mukherjee, S., & Sanyal, G. (2017). Enhanced Position Power First Mapping (PPFM) based image steganography. International Journal of Computers and Applications, 39(2), 59–68. https://doi.org/10.1080/1206212X.2016.1273624

Mythreyi, S., & Vaidehi, V. (2007). Gabor Transform based Image Steganography. IETE Journal of Research, 53(2), 103–112. https://doi.org/10.1080/03772063.2007.10876126

Nasution, M. K. M., Hidayat, R., & Syah, R. (2022). Computer Science. International Journal on Advanced Science, Engineering and Information Technology, 12(3), 1142. https://doi.org/10.18517/ijaseit.12.3.14832

Nasution, M. K. M., Onrizal, & Aulia, I. (2019). Design of the research problem statement. Journal of Physics: Conference Series, 1235(1), 012115. https://doi.org/10.1088/1742-6596/1235/1/012115

Nasution, M. K. M., Sitompul, O. S., Elveny, M., & Syah, R. (2021). Data science: A Review towards the Big Data Problems. Journal of Physics: Conference Series, 1898(1), 012006. https://doi.org/10.1088/1742-6596/1898/1/012006

Pal, S. K., & Madhavan, C. E. V. (2002). Investigating Steganographic Communications. IETE Technical Review, 19(4), 207–212. https://doi.org/10.1080/02564602.2002.11417033

Po-Hsian, H. (2010). A weight-based data hiding method for binary image using selective binary numeral system. Journal of Discrete Mathematical Sciences and Cryptography, 13(5), 429–444. https://doi.org/10.1080/09720529.2010.10698305

Rao, N. V., & Pandit, S. N. N. (2007). Multimedia Digital Rights Protection Using Watermarking Techniques. Information Systems Security, 16(2), 93–99. https://doi.org/10.1080/10658980701322528

Ratan, R., & Veni Madhavan, C. E. (2002). Steganography based Information Security. In IETE Technical Review (Vol. 19, Issue 4).

Rushdi, A. M., & Ba-rukab, O. M. (2005). Fault-tree modelling of computer system security. International Journal of Computer Mathematics, 82(7), 805–819. https://doi.org/10.1080/00207160412331336017

Saad Ahmed, S., Memon, M., Jaffari, R., & Jawaid, M. (2021). StegoBound: A Novel Image Steganography Technique Using Boundary-Based LSB Substitution. Journal of Hunan University Natural Sciences, 48(6), 153–163.

Sairam, T. D., & Boopathybagan, K. (2019). Computational intelligence-based steganalysis comparison for RCM-DWT and PVA-MOD methods. Automatika, 60(3), 285–293. https://doi.org/10.1080/00051144.2019.1579434

Sathisha, N., Kasukurthi Suresh, B., B, R. K., & Patnaik, L. M. (2011). EMBEDDING INFORMATION IN DCT COEFFICIENTS BASED ON AVERAGE COVARIANCE. International Journal of Engineering Science and Technology, 3(4), 3184–3194. https://www.researchgate.net/publication/266333755

Singh, A., & Singh, S. (2013). A Review on the Various Recent Steganography Techniques. IJCSN International Journal of Computer Science and Network, 2(6), 142–156. www.IJCSN.org

Singh, N., & Todwal, V. (2018). A Review of Steganography. International Journal of Innovative Science and Research Technology, 3(1), 723–728. www.ijisrt.com

Singh, S., & Singh, A. (2014). An Information Security Technique Using DES-RSA Hybrid and LSB. International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), 355(14), 187–192. https://www.researchgate.net/publication/278329872

Sirisha, B. L., Kumar, S. S., & Mohan, B. C. (2018). Secret image sharing using eigenvalues and eigenvectors. Journal of Information and Optimization Sciences, 39(4), 871–878. https://doi.org/10.1080/02522667.2017.1383659

Sitompul, O. S., Naibaho, F. R., Situmorang, Z., & Nababan, E. B. (2018). Steganography with Highly Random Linear Congruential Generator for Security Enhancement. 2018 Third International Conference on Informatics and Computing (ICIC), 1–6. https://doi.org/10.1109/IAC.2018.8780445

Srinivasan, K., Gowthaman, T., & Kanakaraj, J. (2017). A novel copyright marking approach using steganography and robust RSA asymmetric-key cryptographic technique in audio files. Journal of Discrete Mathematical Sciences and Cryptography, 20(8), 1563–1571. https://doi.org/10.1080/09720529.2017.1402575

Venukumar, V., & Pathari, V. (2016). A survey of applications of threshold cryptography—proposed and practiced. Information Security Journal: A Global Perspective, 25(4–6), 180–190. https://doi.org/10.1080/19393555.2016.1251996

Wijaya, B. A., Nasution, M. K. M., & Zamzami, E. M. (2018). The steganographic video analysis uses combination of discrete cosine transform and discrete wavelet transform algorithms. Journal of Physics: Conference Series, 1116(2), 022046. https://doi.org/10.1088/1742-6596/1116/2/022046

Yasin, V., Zarlis, M., & Nasution, M. K. M. (2018). FILSAFAT LOGIKA DAN ONTOLOGI ILMU KOMPUTER. Journal of Information System, Applied, Management, Accounting and Research, 2(2), 68–75. http://journal.stmikjayakarta.ac.id/index.php/jisamar




DOI: https://doi.org/10.54314/jssr.v8i1.2481

Article Metrics

Abstract view : 38 times
PDF - 20 times

Copyright (c) 2025 JOURNAL OF SCIENCE AND SOCIAL RESEARCH