MENYISIPKAN PESAN RAHASIA KEDALAM GAMBAR DENGAN METODE BLOWFISH DAN LEAST SIGNIFICANT BIT (LSB)

Siti - Muryanah

Abstract


Current technological developments make information needs very important. However, information that becomes confidential will become public information due to insecurity of the information in the process of exchanging information from the sender to the recipient of the information. In this regard, there are several things that must be considered during the process of sending messages, namely confidentiality, integrity, availability, authenticity, and non-repudiation. On this basis, the authors combine information security with cryptographic and steganographic methods. Cryptography is the change of the original message into a secret message, while steganography is the art of inserting messages into a media so that other people do not realize that there is a secret message in the media. The cryptographic methods that I use are the Blowfish method and the LSB steganography method. The insertion method using the LSB method is the process of inserting messages by presenting binary image files or images with binary representations of secret messages to be hidden. Thus, at every pixel a 24-bit BMP image or image file can be inserted with 3 message bits. The result is a secret message successfully inserted into the picture and reduce the suspicion of others that the picture has confidential information.


Full Text:

PDF

References


Andrian, Y. (2013). Modifikasi Metode Least Significant Bit (LSB) Pada Steganografi Citra Digital. Medan: Seminar Nasional Ilmu Komputer Universitas Methodist Indonesia.

Ariyus, D. (2008). Pengantar Ilmu Kriptografi : Teori, Analisis, dan Implementasi. Yogyakarta: Andi.

Lou, D. C., & Liu, J. L. (2002). Steganographic method for secure communications. Computers and Security, 21(5), 449–460. https://doi.org/10.1016/S0167-4048(02)00515-1

Monica, F. (2016). Aplikasi Steganografi Citra Digital Menggunakan Metode LSB (Least Significant Bit) Visual Basic 6, (May). https://doi.org/10.13140/RG.2.1.4988.7605

Permana, A, A,. 2017, Aplikasi Penyisipan Teks Pada Gambar dengan Algoritma Blowfish dan Least Significant Bit, JIKA (Jurnal Informatika) Vol 1 No 1, ISSN : 2549-0710.

Springer-Verlag. (1994). Fast Software Encryption, Cambridge Security Workshop Proceedings.

Wardoyo, S., Imanullah, Z., & Fahrizal, R. (2016). Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android. Jurnal Nasional Teknik Elektro, 5(1), 36.

https://doi.org/10.25077/jnte.v5n1.199.2016

William, S. (2011). Criptography and Network Security”: United States of America, Rose Kernan.




DOI: http://dx.doi.org/10.31000/jika.v4i3.2869

Article Metrics

Abstract - 381 PDF - 299

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 

CURRENT INDEXING