Analisa Keamanan Data Teks Dengan Menerapkan Kriptografi RSA Dan Steganografi LSB
Abstract
For various reasons, security and confidentiality are needed in data communication. There have been several attempts to deal with the issue of security of confidential data sent over the Internet, including using cryptographic and steganographic techniques. Cryptography is the science and art of maintaining the confidentiality of a message by encoding it in a form that cannot be understood anymore. Cryptographic techniques can arouse suspicion of third parties who are not entitled to receive information because the message is disguised by changing the original message as if it were unreadable. Furthermore, the third party will have the desire to find out the contents of the secret message and try to solve the real information. Whereas steganography further reduces suspicion because a message disguised is hidden in other messages. Steganography can disguise messages into a media without other people realizing that the media has inserted a message. This is because the output of steganography is data that has the same form of perception as the original data when viewed using human senses in cryptography can be seen and realized directly by the human senses. In steganography, confidential data is inserted into other data called cover-objects and produce stego-objects (the results of steganography). To secure messages using steganography techniques LSB steganography is used and uses the RSA method.
Keywords: Cryptography, Steganography, RSA and LSB Methods.
Downloads
References
Zebua, T, Nduru, E. 2017,”Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4”, Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), Vol. 4 No. 4, pp. 279-282, e-ISSN : 2528-6579
Zebua. T, 2018, “Encoding The Record Database Of Computer Based Test Exam Based On Spritz Algorithm”, Lontar Komputer, Vol. 9, No. 1, DOI : 10.24843/LKJITI.2018.v09.I01.p06, e-ISSN : 2541-5832.
Achmad, Komarudin, 2007, “Aplikasi Analisis Multivariate Dengan Program SPSS, Penerbit Andi, Yogyakarta.
Sukrisno, dkk, 2010, “Steganografi Menggunakan Teknik LSB Dengan Kombinasi Algoritma Vigenere dan RC4”, Jurnal Dinamika Informatika, Vol. 5, No. 2
Krinawati, 2008, ”Metode Least Significant Bit dan End Of File Untuk Menyisipkan Teks Ke Dalam Citra Grayscale” Seminar Nasional Informatika (Semnasif), Vol. 1, No. 1
Sadikin, Rifki, 2012, ”Kriptografi Untuk Keamanan Jaringan”, Penerbit Andi, Yogyakarta.
Ariyus, Dony, 2008, ”Computer Security, Andi, Yogyakarta.
Putra, Darma, 2010, “Pengolahan Citra Digital”, Penerbit Andi, Yogyakarta.
Sitorus, S, dkk, 2006, “Pengolahan Citra Digital, Penerbit Andi, Yogyakarta.
S, Riyanto, dkk, 2005,“Step by Step Pengolahan Citra Digital” hal ; 23, Penerbit Andi, Yogyakarta.
Murni. A. 2008, “Pengantar Pengolahan Citra”, Penerbit Alex Media Komputindo, Jakarta
Nugroho, Adi, 2009, “Rekayasa Perangkat Lunak Menggunakan UML dan Java” Penerbit Andi, Yogyakarta.
M. Mesran, “APLIKASI PENGAMANAN DATA TEKS PADA CITRA BITMAP DENGAN MENERAPKAN METODE LEAST SIGNIFICANT BIT (LSB),” Pelita Inform. Inf. dan Inform., vol. 2, no. 1, Dec. 2012.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Analisa Keamanan Data Teks Dengan Menerapkan Kriptografi RSA Dan Steganografi LSB
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).