Prototype "Pengamanan Ganda" Pesan Rahasia Dengan Menggunakan Teknik Steganografi Metode LSB dan Kriptografi Metode Vigenere Cipher
DOI:
https://doi.org/10.31000/jika.v1i2.1392Abstrak
Today information technology has growing into one of the world's most popular media. with the development of information technology is growing also acts misuse of information that is not right. then from development of information technology should also be coupled with the development of information security such as secret message. One way of securing data messages can be done with a combination of cryptography and steganography security techniques. The goal is to keep a message. the combination of cryptography and steganography believed to be a powerful way to protect messages sent and simultaneously avoid the message from suspicion.Referensi
A. J Menezes, P. van Oorschot and S. Vanstone - Handbook of Applied Cryptography UK: CRC Press.
Ariyus, Dony, Kriptografi – Keamanan Data Dan Komunikasi, Graha Ilmu, Yogyakarta, 2006.
Ariyus, Dony, Pengantar Ilmu Kriptografi: Teori, Analisis, dan Implementasi. Penerbit Andi, Yogyakarta, 2008.
Alatas, Putri, Implementasi Teknik Steganografi dengan Metode LSB pada Citra Digital, Universitas Gunadarma, Jakarta, 2009.
B.Tjaru, Setia Negara, Modifikasi Full Vigenere Chipher dengan Pengacakan Susunan Huruf pada Bujur Sangkar Berdasarkan Kunci, ITB Bandung, 2012.
G. Kamdar, Dolly Patira, Dr. C. H. Vithalani, Dual Layer Data Hiding Using Cryptography And Steganography, International Journal of Scientific Engineering and Technology (ISSN : 2277-1581) www.ijset.com, Volume No.1, Issue No.4, pg :134-138, Oktober 2012
Leonardo, Kevin Handoyo, Modifikasi Vigenere Cipher dengan Metode Penyisipan Kunci pada Plaintext, ITB, Bandung, 2012.
A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, Information Hiding -A Survey, Proceeding of the IEEE, vol. 87, Issue 7, pp. 1062-1078, Juli 1999.
Prasetyo, Bambang dan Jannah, L.M., Metode Penelitian Kuantitatif, Jakarta: PT. Rajagrafindo Persada, 2005.
Ramadhani, Budi, Steganografi pada Citra GIF mengggunakan bahasa pemrograman Delphi, UII, Yogyakarta, 2006.
Rosziati Ibrahim and Law Chia Kee, MoBiSiS: An-Android based Application for Sending Stego Image through MMS, ICCGI 2012 : The Seventh International Multi-Conference on Computing in the Global Information Technology, 2012.
Esti Suryani,Titin sri Martini, Kombinasi Kriptografi dengan Hillchipher dan staganografi dengan LSB untuk keamanan data text, Universitas Muhammadiyah, Magelang.
Sulidar Fitri, Implementasi Algoritma Kriptografi DES dan Watermark dengan Metode LSB pada data Citra, Universitas AMIKOM, Yogyakarta, 2010.
Suranta, Ricardo Pramana, Perbandingan Ketahanan Algoritma LSB dan F5 dalam Steganografi Citra, ITB, Bandung, 2012
Sugiyono, Metode Penelitian Kuantitatif, Kualitatif dan R&D, Bandung: Alfabeta, 2012.
Shrikant S. Khaire and Dr. Sanjay L. Nalbalwar, Review: Steganography – Bit Plane Complexity Segmentation (BPCS) Technique, International Journal of Engineering Science and Technology, Vol. 2(9), 4860-4868, 2010.
Shahana T, An Enhanced Security Technique for Steganography Using DCT and RSA, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, Issue 7, July 2013.
Shaik Riyaz, J. Rajakala and M RamaKrishna, Data Security and Authentication using Steganography and STS protocol, International Journal of Advanced Research in Computer Science and Electronics Engineering, Volume 1, Issue 5, July 2012
Namita Tiwari and Dr. Madhu Shandilya, Evaluation of Various LSB based Methods of Image Steganography on GIF File Format, International Journal of Computer Applications, vol. 6, September 2010.
Triputra Safei, Timotius, Pengukuran dan Pengujian Kekuatan Algoritma Auto-key Vigenere Cipher, ITB, Bandung, 2012
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- That it is not under consideration for publication elsewhere,
- That its publication has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Advances in Intelligent Informatics agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.Â
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Licensing for Data Publication
International Journal of Advances in Intelligent Informatics use a variety of waivers and licenses, that are specifically designed for and appropriate for the treatment of data:
Open Data Commons Attribution License, http://www.opendatacommons.org/licenses/by/1.0/ (default)
Creative Commons CC-Zero Waiver, http://creativecommons.org/publicdomain/zero/1.0/
Open Data Commons Public Domain Dedication and Licence, http://www.opendatacommons.org/licenses/pddl/1-0/
Other data publishing licenses may be allowed as exceptions (subject to approval by the editor on a case-by-case basis) and should be justified with a written statement from the author, which will be published with the article.
Open Data and Software Publishing and Sharing
The journal strives to maximize the replicability of the research published in it. Authors are thus required to share all data, code or protocols underlying the research reported in their articles. Exceptions are permitted but have to be justified in a written public statement accompanying the article.
Datasets and software should be deposited and permanently archived inappropriate, trusted, general, or domain-specific repositories (please consult http://service.re3data.org and/or software repositories such as GitHub, GitLab, Bioinformatics.org, or equivalent). The associated persistent identifiers (e.g. DOI, or others) of the dataset(s) must be included in the data or software resources section of the article. Reference(s) to datasets and software should also be included in the reference list of the article with DOIs (where available). Where no domain-specific data repository exists, authors should deposit their datasets in a general repository such as ZENODO, Dryad, Dataverse, or others.
Small data may also be published as data files or packages supplementary to a research article, however, the authors should prefer in all cases a deposition in data repositories.