APLIKASI KEAMANAN PESAN MENGGUNAKAN ALGORITMA STEGANOGRAFI DAN KRIPTOGRAFI

Wawan Setiawan, Juwairiah Juwairiah, Herry Sofyan

Abstract


 

Steganography is a technique of hiding a secret or confidential information in another message so that other people are not aware of the existence of a hidden message. In order for hidden messages or information that it's safer to use the science of cryptography for data encryption. So that the data or messages can not be understood by an unauthorized person who managed to access the data. This application uses methodologies Rappid Guidelines for Application Engineering (Grapple), which consists of Requirement gathering, Analysis, Designs, Development, and Deployment. This application was built using the Java programming language with tools NetBeans IDE 7.0. The algorithm used in this application is the steganography algorithms Least Significant Bit and cryptographic algorithms Vigenere Cipher. The final results of this study is an application of steganography in images by using the method of least significant bit (LSB) and vigenere that can be run on a computer. The image can be used in this application is the image format JPG, PNG, GIF, and BMP. This application can insert text in the image and can perform encryption and decryption at the message you want to insert.

Keywords


application, cryptography, steganography, image, LSB, Vigenere

References


Ariyus, Dony, 2006. Kriptografi Keamanan Data dan Komunikasi. Graha Ilmu. Yogyakarta.

Fowler, M., 2005, UML Distilled Edisi 3 Panduan Singkat Bahasa Pemodelan Objek Standar, Andi, Yogyakarta.

Hermawan, Benny, 2004, Menguasai Java 2 & Object Oriented Programming, Andi Yogyakarta.

Johnson, Neil F. 2001, Information Hiding Steganography and Watermarking – Attack and Countermeasures, Advanced in Information Security, Kluwer Academic Publisher, United State.

Kurniawan, Freddy. 2005. Sistem Digital Konsep dan Aplikasi. Gava Media. Yogyakarta.

Mohanty, S.P, 1999. Watermarking of Digital Images, Indian Institute of Science, india.

Munawar, 2005, Pemodelan Visual dengan UML, Graha Ilmu, Yogyakarta

Munir, Rinaldi, 2006. Kriptografi. Informatika. Bandung.

Putra, Darma. 2010. Pengolahan Citra Digital. Andi. Yogyakarta.

Rosa A dan Shalahuddin M, 2011, Rekayasa Perangkat Lunak Terstruktur dan Beorientasi Objek, Modula, Bandung.

Schmuller, Joseph, 1999, Teach Yourself UML in 24 Hours, San Publising, Indianapolis.

Sellar, D, 1996, An Introduction to Steganography, http://www.cs.utc.ac.za/courses/cs400w/nis/ paper99/ dsellars/stego.htm.

Sukmawan, Budi, 2002 , Steganografi, http://www.bimacipta.com/stegano.htm.

http://astah.change-vision.com/en/index.php. (diakses 5 April 2011)

http://ilmukomputer.org/2007/02/27/netbeans-open-source-java-ide-berbasiskan-swing. (diakses 5 April 2011)




DOI: https://doi.org/10.31315/telematika.v8i2.462

DOI (PDF (Indonesia) (Bahasa Indonesia)): https://doi.org/10.31315/telematika.v8i2.462.g421

Refbacks

  • There are currently no refbacks.




Copyright of :
TELEMATIKA: Jurnal Informatika dan Teknologi Informasi
ISSN 1829-667X (print); ISSN 2460-9021 (online)


Dipublikasi oleh
Jurusan Teknik Informatika, UPN Veteran Yogyakarta
Jl. Babarsari 2 Yogyakarta 55281 (Kampus Unit II)
Telp: +62 274 485786
email: jurnaltelematika@upnyk.ac.id

 

Jurnal Telematika sudah diindeks oleh beberapa lembaga berikut:
 

 

 

 

 

Status Kunjungan Jurnal Telematika
slot gacor slot gacor hari ini slot gacor 2025 demo slot pg slot gacor slot gacor