Prototype "Pengamanan Ganda" Pesan Rahasia Dengan Menggunakan Teknik Steganografi Metode LSB dan Kriptografi Metode Vigenere Cipher

Agung Wibowo

Abstract


Today information technology has growing into one of the world's most popular media. with the development of information technology is growing also acts misuse of information that is not right. then from development of information technology should also be coupled with the development of information security such as secret message. One way of securing data messages can be done with a combination of cryptography and steganography security techniques. The goal is to keep a message. the combination of cryptography and steganography believed to be a powerful way to protect messages sent and simultaneously avoid the message from suspicion.

Full Text:

PDF

References


A. J Menezes, P. van Oorschot and S. Vanstone - Handbook of Applied Cryptography UK: CRC Press.

Ariyus, Dony, Kriptografi – Keamanan Data Dan Komunikasi, Graha Ilmu, Yogyakarta, 2006.

Ariyus, Dony, Pengantar Ilmu Kriptografi: Teori, Analisis, dan Implementasi. Penerbit Andi, Yogyakarta, 2008.

Alatas, Putri, Implementasi Teknik Steganografi dengan Metode LSB pada Citra Digital, Universitas Gunadarma, Jakarta, 2009.

B.Tjaru, Setia Negara, Modifikasi Full Vigenere Chipher dengan Pengacakan Susunan Huruf pada Bujur Sangkar Berdasarkan Kunci, ITB Bandung, 2012.

G. Kamdar, Dolly Patira, Dr. C. H. Vithalani, Dual Layer Data Hiding Using Cryptography And Steganography, International Journal of Scientific Engineering and Technology (ISSN : 2277-1581) www.ijset.com, Volume No.1, Issue No.4, pg :134-138, Oktober 2012

Leonardo, Kevin Handoyo, Modifikasi Vigenere Cipher dengan Metode Penyisipan Kunci pada Plaintext, ITB, Bandung, 2012.

A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, Information Hiding -A Survey, Proceeding of the IEEE, vol. 87, Issue 7, pp. 1062-1078, Juli 1999.

Prasetyo, Bambang dan Jannah, L.M., Metode Penelitian Kuantitatif, Jakarta: PT. Rajagrafindo Persada, 2005.

Ramadhani, Budi, Steganografi pada Citra GIF mengggunakan bahasa pemrograman Delphi, UII, Yogyakarta, 2006.

Rosziati Ibrahim and Law Chia Kee, MoBiSiS: An-Android based Application for Sending Stego Image through MMS, ICCGI 2012 : The Seventh International Multi-Conference on Computing in the Global Information Technology, 2012.

Esti Suryani,Titin sri Martini, Kombinasi Kriptografi dengan Hillchipher dan staganografi dengan LSB untuk keamanan data text, Universitas Muhammadiyah, Magelang.

Sulidar Fitri, Implementasi Algoritma Kriptografi DES dan Watermark dengan Metode LSB pada data Citra, Universitas AMIKOM, Yogyakarta, 2010.

Suranta, Ricardo Pramana, Perbandingan Ketahanan Algoritma LSB dan F5 dalam Steganografi Citra, ITB, Bandung, 2012

Sugiyono, Metode Penelitian Kuantitatif, Kualitatif dan R&D, Bandung: Alfabeta, 2012.

Shrikant S. Khaire and Dr. Sanjay L. Nalbalwar, Review: Steganography – Bit Plane Complexity Segmentation (BPCS) Technique, International Journal of Engineering Science and Technology, Vol. 2(9), 4860-4868, 2010.

Shahana T, An Enhanced Security Technique for Steganography Using DCT and RSA, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, Issue 7, July 2013.

Shaik Riyaz, J. Rajakala and M RamaKrishna, Data Security and Authentication using Steganography and STS protocol, International Journal of Advanced Research in Computer Science and Electronics Engineering, Volume 1, Issue 5, July 2012

Namita Tiwari and Dr. Madhu Shandilya, Evaluation of Various LSB based Methods of Image Steganography on GIF File Format, International Journal of Computer Applications, vol. 6, September 2010.

Triputra Safei, Timotius, Pengukuran dan Pengujian Kekuatan Algoritma Auto-key Vigenere Cipher, ITB, Bandung, 2012




DOI: http://dx.doi.org/10.31000/jika.v1i2.1392

Article Metrics

Abstract - 329 PDF - 610

Refbacks

  • There are currently no refbacks.




 

CURRENT INDEXING