Image Quality Analysis of PNG Images on WhatsApp Messenger Sending

Fahmi Anwar, Abdul Fadlil, Imam Riadi

Abstract


Technology is growing rapidly, especially in communication with various types of information services such as internet-based messages. One of the most popular internet-based messages in Indonesia is WhatsApp Messenger. WhatsApp is a chat application that can be used on many platforms. Message sending on WhatsApp is carried out end-to-end encryption from the sender to the message recipient. The sending of messages in PNG images is secured using end-to-end encryption and compressed according to predefined rules. This study analyzes Image Compression and Alpha channel in PNG by comparing PNG images before being sent with PNG images that have gone through the sending process on WhatsApp using the test-driven development (TDD) method. The analysis results contain comparisons based on the RMSE, SSIM, PSNR, and MD5 hash values. Delivery with a gallery image attachment type using an image transparent background changes to a white image background. While those with a background other than transparent have good image quality because it has a PSNR value of more than 35 dB, and submissions with document attachment types do not experience changes in MD5 hash value and image quality.

Keywords


Analysis; Compression; Picture; PNG; WhatsApp

Full Text:

PDF (Indonesian)

References


Ai Munandar, T., Adelvin L, M., & Santoso, A. J. (2011). Analisa Psnr, Rasio Kompresi Warna Dan Mse Terhadap Kompresi Image Menggunakan 31 Fungsi Wavelet. 2(db 1), 71–81.

Anglano, C. (2014). Forensic analysis of whats app messenger on Android smartphones. Digital Investigation, 11(3), 201–213. https://doi.org/10.1016/j.diin.2014.04.003

Anwar, F., Fadlil, A., & Riadi, I. (2020a). Analisis Validasi Image PNG File Upload menggunakan Metadata pada Aplikasi Berbasis Web. Edu Komputika Journal, 7(1), 10–15. https://doi.org/10.15294/edukomputika.v7i1.38722

Anwar, F., Fadlil, A., & Riadi, I. (2020b). Validation Analysis of Scalable Vector Graphics ( SVG ) File Upload using Magic Number and Document Object Model ( DOM ). (IJACSA) International Journal of Advanced Computer Science and Applications, 11(11), 255–262. https://dx.doi.org/10.14569/IJACSA.2020.0111133

Anwar, F., Fadlil, A., & Riadi, I. (2019). Analisa Keamanan Image JPEG File Upload Menggunakan Metadata dan GD Graphic Library Pada Aplikasi Berbasis Web. In U. Krisnadwipayana (Ed.), Seminar Nasional Teknologi Fakultas Teknik Universitas Krisnadwipayana (pp. 479–487). Universitas Krisnadwipayana.

Bharti, P., Gupta, S., & Bhatia, R. (2009). Comparative analysis of image compression techniques: A case study on medical images. ARTCom 2009 - International Conference on Advances in Recent Technologies in Communication and Computing, 820–822. https://doi.org/10.1109/ARTCom.2009.88

Chen, H., Zhang, L. J., Hu, B., Long, S. Z., & Luo, L. H. (2015). On Developing and Deploying Large-File Upload Services of Personal Cloud Storage. Proceedings - 2015 IEEE International Conference on Services Computing, SCC 2015, 371–378. https://doi.org/10.1109/SCC.2015.58

Erlingsson, U., Livshits, B., & Xie, Y. (2007). End-to-end Web Application Security. Proceedings of the 11th Workshop on Hot Topics in Operating Systems (HotOS’07), San Diego, CA, 2–7. https://www.microsoft.com/en-us/research/publication/end-to-end-web-application-security/

Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2), 26–34. https://doi.org/10.1109/MC.1998.4655281

Kaushik, A., & Gupta, M. (2012). Analysis of Image Compression Algorithms. International Journal of Engineering Research and Applications, 2(2), 773–779.

Mehra, R., & Scholar, M. E. (2016). Estimation of the Image Quality under Different Distortions. 5(17291), 17291–17296. https://doi.org/10.18535/ijecs/v5i7.20

Mohammadi, P., Ebrahimi-moghadam, A., & Shirani, S. (2014). Subjective and Objective Quality Assessment of Image : A Survey. June, 1–50.

O’Hara, K., Massimi, M., Harper, R., Rubens, S., & Morris, J. (2014). Everyday dwelling with WhatsApp. Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW, 1131–1143. https://doi.org/10.1145/2531602.2531679

Poornima, R., & Iswarya, R. J. (2013). An Overview Of Image Steganography. International Journal of Computer Science & Engineering Survey, 4(1), 23–31.

Pressman, R. S., & Maxim, B. R. (2014). Software Engineering : a practitioner’s approach (8th ed.). McGraw-Hill Education.

Rajkumar, S., & Malathi, G. (2016). A Comparative Analysis on Image Quality Assessment for Real Time Satellite Images. 9(September). https://doi.org/10.17485/ijst/2016/v9i34/96766

Riadi, I., & Nasrulloh, I. M. (2019). Analisis Forensik Solid State Drive (SSD) menggunakan Framework GRR Rapid Response Forensic. 6(5), 509–518. https://doi.org/10.25126/jtiik.201961516

Sara, U., Akter, M., & Uddin, M. S. (2019). Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study. Journal of Computer and Communications, 07(03), 8–18. https://doi.org/10.4236/jcc.2019.73002

Sari, T., Riadi, I., & Fadlil, A. (2016). Forensik Citra untuk Deteksi Rekayasa File Menggunakan Error Level Analysis. Annual Research Seminar 2016, 2(1), 133–138. http://ars.ilkom.unsri.ac.id

Sulistyo, W. Y., Riadi, I., & Yudhana, A. (2018). Analisis Deteksi Keaslian Citra Menggunakan Teknik. 2018(November), 154–159.

Vijayvargiya, G., Silakari, S., & Pandey, R. (2013). A Survey: Various Techniques of Image Compression. 11(10). http://arxiv.org/abs/1311.6877

Zaenudin, Sugiantoro, B., & Prayudi, Y. (2018). Metadata Forensik Untuk Analisis Korelasi Bukti Digital. 10(1), 85–89.




DOI: http://dx.doi.org/10.35671/telematika.v14i1.1114

Refbacks

  • There are currently no refbacks.




Indexed by:


Telematika
ISSN: 2442-4528 (online) | ISSN: 1979-925X (print)
Published by : Universitas Amikom Purwokerto
Jl. Let. Jend. POL SUMARTO Watumas, Purwonegoro - Purwokerto, Indonesia


Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License .