MENYISIPKAN PESAN RAHASIA KEDALAM GAMBAR DENGAN METODE BLOWFISH DAN LEAST SIGNIFICANT BIT (LSB)
DOI:
https://doi.org/10.31000/jika.v4i3.2869Abstrak
Current technological developments make information needs very important. However, information that becomes confidential will become public information due to insecurity of the information in the process of exchanging information from the sender to the recipient of the information. In this regard, there are several things that must be considered during the process of sending messages, namely confidentiality, integrity, availability, authenticity, and non-repudiation. On this basis, the authors combine information security with cryptographic and steganographic methods. Cryptography is the change of the original message into a secret message, while steganography is the art of inserting messages into a media so that other people do not realize that there is a secret message in the media. The cryptographic methods that I use are the Blowfish method and the LSB steganography method. The insertion method using the LSB method is the process of inserting messages by presenting binary image files or images with binary representations of secret messages to be hidden. Thus, at every pixel a 24-bit BMP image or image file can be inserted with 3 message bits. The result is a secret message successfully inserted into the picture and reduce the suspicion of others that the picture has confidential information.
Referensi
Andrian, Y. (2013). Modifikasi Metode Least Significant Bit (LSB) Pada Steganografi Citra Digital. Medan: Seminar Nasional Ilmu Komputer Universitas Methodist Indonesia.
Ariyus, D. (2008). Pengantar Ilmu Kriptografi : Teori, Analisis, dan Implementasi. Yogyakarta: Andi.
Lou, D. C., & Liu, J. L. (2002). Steganographic method for secure communications. Computers and Security, 21(5), 449–460. https://doi.org/10.1016/S0167-4048(02)00515-1
Monica, F. (2016). Aplikasi Steganografi Citra Digital Menggunakan Metode LSB (Least Significant Bit) Visual Basic 6, (May). https://doi.org/10.13140/RG.2.1.4988.7605
Permana, A, A,. 2017, Aplikasi Penyisipan Teks Pada Gambar dengan Algoritma Blowfish dan Least Significant Bit, JIKA (Jurnal Informatika) Vol 1 No 1, ISSN : 2549-0710.
Springer-Verlag. (1994). Fast Software Encryption, Cambridge Security Workshop Proceedings.
Wardoyo, S., Imanullah, Z., & Fahrizal, R. (2016). Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android. Jurnal Nasional Teknik Elektro, 5(1), 36.
https://doi.org/10.25077/jnte.v5n1.199.2016
William, S. (2011). Criptography and Network Securityâ€: United States of America, Rose Kernan.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- That it is not under consideration for publication elsewhere,
- That its publication has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Advances in Intelligent Informatics agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.Â
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Licensing for Data Publication
International Journal of Advances in Intelligent Informatics use a variety of waivers and licenses, that are specifically designed for and appropriate for the treatment of data:
Open Data Commons Attribution License, http://www.opendatacommons.org/licenses/by/1.0/ (default)
Creative Commons CC-Zero Waiver, http://creativecommons.org/publicdomain/zero/1.0/
Open Data Commons Public Domain Dedication and Licence, http://www.opendatacommons.org/licenses/pddl/1-0/
Other data publishing licenses may be allowed as exceptions (subject to approval by the editor on a case-by-case basis) and should be justified with a written statement from the author, which will be published with the article.
Open Data and Software Publishing and Sharing
The journal strives to maximize the replicability of the research published in it. Authors are thus required to share all data, code or protocols underlying the research reported in their articles. Exceptions are permitted but have to be justified in a written public statement accompanying the article.
Datasets and software should be deposited and permanently archived inappropriate, trusted, general, or domain-specific repositories (please consult http://service.re3data.org and/or software repositories such as GitHub, GitLab, Bioinformatics.org, or equivalent). The associated persistent identifiers (e.g. DOI, or others) of the dataset(s) must be included in the data or software resources section of the article. Reference(s) to datasets and software should also be included in the reference list of the article with DOIs (where available). Where no domain-specific data repository exists, authors should deposit their datasets in a general repository such as ZENODO, Dryad, Dataverse, or others.
Small data may also be published as data files or packages supplementary to a research article, however, the authors should prefer in all cases a deposition in data repositories.