Pengamanan Pesan Teks Terenkripsi Algoritma AES yang Disembunyikan kedalam Citra Menggunakan Algoritma Gifhsuffle
Abstract
The advancement of information systems in the field of computer science and telecommunications is growing and advancing rapidly. Computer technology is needed for office or personal work to be faster, data exchange is easier to do. Data can be in the form of messages in the form of text, images, audio or video. Data that is private and confidential cannot be known by the public or published. The combination of cryptographic techniques and steganographic techniques can increase the security of text messages so as to minimise the occurrence of text message damage that can be done by irresponsible parties and harm the owner of the text message. The AES algorithm is an algorithm that can perform cryptographic techniques, while the Gifhsuffle algorithm is an algorithm that can perform steganographic techniques. This research uses the AES algorithm for the encryption and decryption process and uses the Gifhsuffle algorithm for the encoding and decoding process. A file containing a message will be encrypted using the AES algorithm to produce a ciphertext followed by hiding it in a GIF-formatted image file using the Gifhsuffle algorithm encoding process to produce a Stego Image. This process can increase the security of the message and make it difficult for irresponsible parties to find the message.
Downloads
References
M. Winafil, S. Sinurat dan T. Zebua,” Implementasi Algoritma Advanced Encryption Standard Untuk MengamankanCitra Digital”, KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), vol. 2, pp.450- 459, 2018
D. Anggara dan A. S. Sembiring” Peningkatan Keamanan Data Teks Terenkripsi Algoritma Lucifer Menggunakan Steganografi Gifshuffle Pada Citra”, KOMIK (Konfersi Nasional Teknologi Informasi dan Komputer), Vol. 3, pp.439-445, 2019
S. Kromodimoeljo, Teori dan Aplikasi Kriptografi, : SPK IT Consulting, 2009.
A. Widarma, "Kombinasi Algoritma AES, RC4 dan Elmagal Dalam Skema Hybrid Untuk Keamanan Data", Journal of Computer Engineering System and Science, vol. 1, pp.1-8, 2016
V. Yuniati, G. Indriyanta and A. Rachmat, "Enkripsi dan Dekripsi dengan Algoritma AES 256 Untuk Semua Jenis File", Informatika, vol. 5, pp.23-31, 2009
Wikipedia, (2018,jan.12). Rijdael MixColumns [online]. Available: https://en.wikipedia.org/wiki/Rijndael_MixColumns
D. Darwis, "Teknik Steganografi Untuk Penyembunyian Pesan Teks Menggunakan Algoritma Gifshuffle," Jurnal Teknoinfo, vol. 11, no. 1, pp. 1- 6, 2017.
M. Khairani and S. Sembiring, "Analisis dan Implementasi Steganografi Pada Citra GIF Menggunakan Algoritma Gifshuffle," SNASTIKOM, pp. 9-14, 2013.
S. Dharwiyanti and R. S. Wahono, "Pengantar Unified Modeling Language (UML)," IlmuKomputer.Com, 2003
E. Shygan, "Daftar Simbol UML," 24 May 2013. [Online]. Available: https://id.scribd.com/document/143412967/Daftar-Simbol-Uml. [Accessed 08 May 2019].
E. Sutanta, Pengantar Teknologi Informasi, Yogyakarta: Graha Ilmu. 2005.
Hendrayudi, Dasar-Dasar Pemograman Microsoft Visual Basic 2008, Bandung: SatuNusa, 2011.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Pengamanan Pesan Teks Terenkripsi Algoritma AES yang Disembunyikan kedalam Citra Menggunakan Algoritma Gifhsuffle
Pages: 221-233
Copyright (c) 2024 Hary Octariza

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).