cover
Contact Name
Dirja Nur Ilham
Contact Email
dirja.poltas@gmail.com
Phone
+6285261233288
Journal Mail Official
dirja.poltas@gmail.com
Editorial Address
Kampus Politeknik Aceh Selatan, Jl. Merdeka Komplek Reklamasi Pantai
Location
Kota banda aceh,
Aceh
INDONESIA
JIKUM: Jurnal Ilmu Komputer
ISSN : -     EISSN : 3090739X     DOI : https://doi.org/10.62671/jikum.v1i2
Core Subject : Science,
JIKUM: Jurnal Ilmu Komputer menerbitkan artikel dalam Bahasa Indonesia yang akan diterbitkan 2 kali setahun yaitu periode Mei dan Nopember. Penulis yang mengirimkan naskah pada JIKUM: Jurnal Ilmu Komputer harus mengikuti pedoman penulisan, fokus dan ruang lingkup jurnal, serta template jurnal. Apabila naskah yang dikirim tidak sesuai dengan ketentuan tersebut, maka artikel akan ditolak.
Articles 64 Documents
Implementasi Pengamanan Data Menggunakan Kombinasi Algoritma Kriptografi AES-256 dan Teknik Steganografi End-of-File (EOF) Pada Media Citra Digital Harahap, Jakbar Ali; Aulia, Muhammad; Alfarisi, Muhammad Rasyya; Sohaimi, Soty
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.188

Abstract

In the contemporary digital landscape, the security and confidentiality of information exchange have emerged as paramount concerns due to the increasing sophistication of cyber threats. This study proposes an integrated security framework through the development of "PrivaSel," a hybrid application that synergizes advanced cryptography and steganography to achieve dual-layer protection. The system employs the Advanced Encryption Standard (AES) with a robust 256-bit key length, implemented in Cipher Block Chaining (CBC) mode to ensure high-level data confidentiality and resistance against frequency analysis attacks. Key derivation is further strengthened using the PBKDF2 algorithm with 100,000 iterations and a random salt to mitigate brute-force vulnerabilities. For the covert layer, the system utilizes the End-of-File (EOF) steganography technique, which embeds encrypted payloads into diverse container media including images and videos without altering the spatial pixel data. Developed using a Python-based FastAPI backend and a responsive HTML5/Tailwind CSS frontend, the application facilitates seamless asynchronous processing. Empirical testing through histogram analysis confirms that the EOF method maintains absolute visual integrity, yielding a Mean Squared Error (MSE) of 0.00 and an infinite Peak Signal-to-Noise Ratio (PSNR). The results demonstrate that while the file size increases linearly relative to the payload and metadata overhead, the hidden information remains imperceptible to statistical analysis and can be flawlessly retrieved only with the authorized password, providing a reliable solution for secure multi-file data transmission.
Implementasi Teknik Least Significant Bit (LSB) dan File Injection untuk Pengamanan Data Berbasis Web Muammar, Yasir; Pasya, Najwa; Adha, Naufal Syahputra; Putra, Mhd Dwi
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.192

Abstract

Keamanan pertukaran informasi di ruang siber menjadi tantangan besar seiring meningkatnya risiko penyadapan data sensitif oleh pihak yang tidak berwenang. Steganografi muncul sebagai solusi proteksi tingkat lanjut dengan menyembunyikan eksistensi pesan di dalam media digital lain sehingga tidak memicu kecurigaan. Penelitian ini bertujuan untuk merancang dan mengimplementasikan aplikasi "SteganoSafe" berbasis web yang mampu mengamankan data teks dan dokumen di dalam file gambar serta audio. Sistem ini dikembangkan menggunakan bahasa pemrograman Python dengan framework Flask, serta mengandalkan dua teknik utama: Least Significant Bit (LSB) dan File Injection. Pada metode LSB, pesan teks dikonversi menjadi biner dan disisipkan ke dalam bit paling tidak signifikan pada piksel gambar (format PNG/JPG) atau frame audio (format WAV). Proses ini memastikan bahwa perubahan pada media pembawa tidak dapat dideteksi secara visual maupun auditif oleh manusia. Di sisi lain, teknik File Injection memungkinkan penyisipan file dokumen seperti PDF atau ZIP dengan cara menggabungkan data biner file rahasia ke akhir file pembawa menggunakan separator unik sebagai penanda biner. Pengujian fungsional menunjukkan bahwa sistem berhasil melakukan enkapsulasi dan ekstraksi data dengan integritas 100% tanpa kerusakan data asli. Penggunaan antarmuka web modern dengan konsep glassmorphism memberikan kemudahan aksesibilitas dan pengalaman pengguna yang intuitif. Hasil penelitian menyimpulkan bahwa kombinasi algoritma LSB dan manajemen biner melalui platform web menyediakan mekanisme perlindungan data yang efisien, transparan, dan andal untuk kebutuhan komunikasi rahasia.
Studi Keamanan Akun Media Sosial Mahasiswa Terhadap Serangan Phising Berbasis Social Engineering Muammar, Yasir; Juliana, Juliana; Azizah, Maila; Hafizah, Hafifatul; Sari, Maita Berliana; Khairunnisa
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.194

Abstract

The massive use of social media among university students provides convenience in communication, information exchange, and academic activities. However, this condition also increases the risk of cybercrime, particularly phishing attacks based on social engineering. Phishing exploits psychological manipulation to deceive victims into revealing sensitive information such as passwords, OTP codes, and personal data. This study aims to analyze students’ awareness of social media account security, identify common forms of phishing attacks experienced, and determine factors contributing to students’ vulnerability. This research employs a quantitative descriptive method by distributing online questionnaires to active university students. The collected data were analyzed using descriptive statistics to identify behavioral patterns and security awareness levels. The results indicate that most students have moderate to low digital security awareness, reflected in password reuse across platforms and low adoption of two-factor authentication. Furthermore, most respondents have encountered phishing messages in the form of fake links, prize scams, and account verification requests. The main vulnerability factors include limited cybersecurity literacy, high levels of trust, and lack of information verification. This study highlights the importance of digital security education and improved cybersecurity literacy among students to reduce the risk of social engineering-based phishing attacks.
Analisis Pengaruh Panjang Pesan terhadap Kualitas Citra pada Steganografi LSB Ardiansah, Andre; Zakkiansyah, Teuku; Gunawan , Elandri; Kombih, Muhammad Kharizky Rachman
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.195

Abstract

This study examines how variations in message length influence image quality in Least Significant Bit (LSB) steganography. Steganography embeds secret information into digital images, and LSB is one of the simplest and most widely applied techniques due to its low computational cost and ease of implementation. However, increasing the payload size may degrade the visual quality of the stego-image and make it more susceptible to detection. The objective of this research is to analyze the relationship between the amount of embedded data and the resulting image quality. The method involves embedding messages of different lengths into a set of test images using the LSB approach, followed by quantitative quality assessment through metrics such as Peak Signal-to-Noise Ratio (PSNR) and Mean Squared Error (MSE). Experimental results indicate that longer embedded messages lead to a gradual decline in visual quality, reflected by decreasing PSNR values and increasing MSE scores, although moderate payloads still maintain acceptable image fidelity. These findings highlight the trade-off between capacity and imperceptibility in LSB-based steganography and provide useful guidance for determining suitable message sizes in practical data-hiding applications.
Strategi Layanan Keamanan Siber pada Ekosistem Multi-Platform: Tinjauan Literatur Khairudiah, Khairudiah; Reifan, Reifan; Al Hasbi, Alam; Az zahra, Nasywa; Amin, Farid Deza
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.196

Abstract

The rapid escalation of digital technology adoption has compelled modern organizations to operate within complex multi-platform ecosystems, integrating diverse operating systems, mobile devices, web applications, and cloud services. While this convergence enhances operational agility, it significantly expands the potential attack surface, exposing critical assets to sophisticated cyber threats. This study employs a Systematic Literature Review (SLR) methodology to evaluate and compare contemporary cybersecurity strategies. Analyzing 15 primary studies selected from reputable databases between 2018 and 2024, this research contrasts the efficacy of Perimeter-based models, Defense-in-Depth, and Zero Trust Architecture (ZTA). The findings demonstrate that traditional static security perimeters are obsolete in decentralized environments. Conversely, a hybrid approach combining Zero Trust with AI-driven threat detection offers superior resilience, reducing incident response latency and preventing lateral movement. The study concludes by proposing an integrated security framework that positions cybersecurity as a strategic business enabler rather than a technical support function.
Implementasi Metode LSB (Least Significant Bit) Pada Aplikasi Steganografi Citra Untuk Pengamanan Pesan Teks Karo Karo, Taufik Ismail; Herlambang, Ahmad Fadhil; Nurfadhilla, Putri Alifi; Fachrul, Muhammad
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.200

Abstract

Keamanan informasi dalam pertukaran data digital saat ini menghadapi tantangan besar terkait risiko penyadapan oleh pihak yang tidak berwenang. Penelitian ini bertujuan untuk mengimplementasikan teknik steganografi menggunakan metode Least Significant Bit (LSB) untuk mengamankan pesan teks rahasia ke dalam media citra digital. Metode LSB dipilih karena kemampuannya menyisipkan bit data pada lapisan bit paling rendah dari piksel citra sehingga tidak mengubah kualitas visual secara signifikan (imperceptibility). Pengembangan aplikasi ini mencakup proses penyisipan (embedding) dan pengambilan kembali (extracting) pesan. Hasil pengujian menunjukkan bahwa aplikasi mampu mengekstraksi pesan dengan tingkat akurasi 100% tanpa adanya kerusakan data. Selain itu, analisis visual membuktikan bahwa citra hasil steganografi tetap terjaga kualitasnya dan sulit dibedakan dengan citra asli oleh indra penglihatan manusia, sehingga efektif dalam menjaga kerahasiaan informasi selama proses transmisi.
Desain dan Implementasi Aplikasi Steganografi Dual Mode Berbasis Java untuk Menyembunyikan Pesan Teks dan Gambar Sundari, Siti; Vazira, Mauliza; Fitri, Monica Annisa; Hafizah, Hafizah
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.201

Abstract

Steganography is a method of protecting information by hiding secret messages within a carrier medium, making their presence difficult for others to detect. This research aims to design and build a Java-based dual-mode steganography application that can hide text messages within text (text-to-text) and image messages within text (text-to-image). This application was created using the Java programming language with an object-oriented programming approach, and utilizes the Base64 encoding technique as a means of embedding data. The research methods applied included requirements analysis, system design, implementation, and application testing. The test results demonstrated that this application can effectively hide and extract text messages and images, while using a password as an additional layer of security. We hope this application can be a practical solution for maintaining the confidentiality of digital data, while also serving as a useful steganography learning tool for students.
Rancang Bangun Aplikasi Steganografi Berbasis Web Menggunakan Metode Least Significant Bit (LSB) Dan XOR Untuk Enkripsi File Berbasis Citra Firmansyah, Indra; Winata, Bayu; Azkia, Diana; Ula, Rahmatul
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.203

Abstract

Data security is vital in digital exchange, yet standard Least Significant Bit (LSB) steganography remains vulnerable to unauthorized extraction. This study aims to develop a web-based steganography application combining LSB with Exclusive OR (XOR) encryption to enhance confidentiality. The proposed method involves encrypting secret data using XOR operations before embedding it into the cover image's LSB. The application is built on a web platform for accessibility, and the resulting image quality is evaluated using Mean Square Error (MSE) and Peak Signal-to-Noise Ratio (PSNR). The results demonstrate that the system successfully embeds and extracts data intactly. The obtained PSNR values exceed 40 dB, indicating that the stego-images maintain high visual fidelity indistinguishable from the original images, thereby offering a robust solution for secure data transmission.
Implementasi Penyembunyian Data pada Metadata PNG Menggunakan Enkripsi Fernet (AES) Berbasis Password dengan Python Rahmi, Ulvia; Quranul, Mutia Hafizah; Dian , Putri; Amna, Rahmtul
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.204

Abstract

The rapid exchange of digital information necessitates robust security measures to protect sensitive data from unauthorized access. This research proposes a hybrid security model combining cryptography and steganography to hide information within PNG image metadata. The system utilizes Fernet symmetric encryption, which is built on top of AES-128, to secure the message before embedding it into the metadata fields. A password-based key derivation ensures that only authorized users can decrypt the content. By leveraging Python for implementation, the study demonstrates that metadata-based steganography provides a secure alternative to traditional pixel-based methods, as it does not alter the visual quality of the image. The results indicate that the encrypted metadata is resilient to basic image viewing while maintaining data integrity.
Implementasi Metode Least Significant Bit dan Advanced Encryption Standard pada Aplikasi Steganografi Berbasis Web Siregar, Nazrivan Ibrahim; Samudera, Bayu; Panggabean, Romi Okto Rifansah; Fauzan, Ibnu Fauzan
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.205

Abstract

Information security is a crucial aspect in the digital era, particularly in data transmission over the internet. In addition to cryptography, steganography serves as an alternative approach that conceals the existence of information itself. This study aims to design and implement a web-based digital steganography application by integrating the Least Significant Bit (LSB) method with the Advanced Encryption Standard (AES) algorithm. The LSB method is used to embed data into digital images by modifying the least significant bits, while AES encrypts the payload prior to embedding. The application is developed using PHP and a web-based interface. The results indicate that the system can embed text messages and document files into digital images without significantly affecting visual quality, and the hidden data can only be extracted using the correct password. Therefore, the integration of steganography and cryptography provides a dual-layer security mechanism for protecting digital information.