APLIKASI KEAMANAN PESAN MENGGUNAKAN ALGORITMA STEGANOGRAFI DAN KRIPTOGRAFI
Abstract
Steganography is a technique of hiding a secret or confidential information in another message so that other people are not aware of the existence of a hidden message. In order for hidden messages or information that it's safer to use the science of cryptography for data encryption. So that the data or messages can not be understood by an unauthorized person who managed to access the data. This application uses methodologies Rappid Guidelines for Application Engineering (Grapple), which consists of Requirement gathering, Analysis, Designs, Development, and Deployment. This application was built using the Java programming language with tools NetBeans IDE 7.0. The algorithm used in this application is the steganography algorithms Least Significant Bit and cryptographic algorithms Vigenere Cipher. The final results of this study is an application of steganography in images by using the method of least significant bit (LSB) and vigenere that can be run on a computer. The image can be used in this application is the image format JPG, PNG, GIF, and BMP. This application can insert text in the image and can perform encryption and decryption at the message you want to insert.
Keywords
Full Text:
PDF (Indonesia) (Bahasa Indonesia)References
Ariyus, Dony, 2006. Kriptografi Keamanan Data dan Komunikasi. Graha Ilmu. Yogyakarta.
Fowler, M., 2005, UML Distilled Edisi 3 Panduan Singkat Bahasa Pemodelan Objek Standar, Andi, Yogyakarta.
Hermawan, Benny, 2004, Menguasai Java 2 & Object Oriented Programming, Andi Yogyakarta.
Johnson, Neil F. 2001, Information Hiding Steganography and Watermarking – Attack and Countermeasures, Advanced in Information Security, Kluwer Academic Publisher, United State.
Kurniawan, Freddy. 2005. Sistem Digital Konsep dan Aplikasi. Gava Media. Yogyakarta.
Mohanty, S.P, 1999. Watermarking of Digital Images, Indian Institute of Science, india.
Munawar, 2005, Pemodelan Visual dengan UML, Graha Ilmu, Yogyakarta
Munir, Rinaldi, 2006. Kriptografi. Informatika. Bandung.
Putra, Darma. 2010. Pengolahan Citra Digital. Andi. Yogyakarta.
Rosa A dan Shalahuddin M, 2011, Rekayasa Perangkat Lunak Terstruktur dan Beorientasi Objek, Modula, Bandung.
Schmuller, Joseph, 1999, Teach Yourself UML in 24 Hours, San Publising, Indianapolis.
Sellar, D, 1996, An Introduction to Steganography, http://www.cs.utc.ac.za/courses/cs400w/nis/ paper99/ dsellars/stego.htm.
Sukmawan, Budi, 2002 , Steganografi, http://www.bimacipta.com/stegano.htm.
http://astah.change-vision.com/en/index.php. (diakses 5 April 2011)
http://ilmukomputer.org/2007/02/27/netbeans-open-source-java-ide-berbasiskan-swing. (diakses 5 April 2011)
DOI: https://doi.org/10.31315/telematika.v8i2.462
DOI (PDF (Indonesia) (Bahasa Indonesia)): https://doi.org/10.31315/telematika.v8i2.462.g421
Refbacks
- There are currently no refbacks.
Status Kunjungan Jurnal Telematika