Implementasi Algoritma Hybrid dan Metode Least Significant Bit Untuk Keamanan Data

Ibnu Sulistyo, Eko Aribowo

Abstract


Computer networks can improve the quality of communication; however, it also allows accessing data illegally. Unauthorized access to people’s data can cause harm. In order for the data to remain safe, the cryptographic algorithm encryption process is needed. Nevertheless, there is also a disadvantage of encryption which can lead to suspicions. To get rid of unnecessary suspicion, there is a need for steganography algorithms, and one way of making sure that it is hidden is by using the least significant bit method. This research uses a hybrid algorithm and the least significant bit technique. Hybrid algorithm models are used for better security before being concealed under the image, and the only way of doing that is by using least significant bit method. The types of image files used are PNG and JPG or JPEG. The success rate of this experiment is 100%, with eight tests that have been done with a maximum insertion of 5000 characters.

Keywords


Hybrid, Least Significant Bit; Kriptografi; Steganografi

Full Text:

References


M.H.Arif, and A.Z.Fanani, “Kriptografi Hill Cipher dan Least Significant Bit untuk Keamanan Pesan pada Citra,” Computer Science Research and Its Development Journal(CSRID), vol. 8, no. 1, pp. 60-72, 2016.

Soleh, F. Alfiah, and B. Yusuf, “Perancangan Aplikasi Steganografi Dengan Teknik LSB dan AlgoritmaRC4 & Base64 Encoding,” Technomedia Journal (TMJ), vol.3, no.1, 2018.

M. Husein, “Implementasi Caesar Cipher untuk Penyembunyian Pesan Text Rahasia Pada Citra dengan Menggunakan Metode Least Significant Bit,” Pelita Informatika Budi Darma, vol.VII, no.2, 2014.

A. Muadzani, O.D. Nurhayati, and I.P. Windasari, “Penyisipan Media Teks dan Citra Menggunkan Teknik Stganografi pada Media Pembawa Citra Digital,” Jurnal Teknologi dan Sistem Komputer, vol.4, no.3, 2016.

Rahimah, “Implementasi Penyembunyian dan Penyandian Pesan Pada Citra Menggunakan Algoritma Affine Cipher dan Metode Least Significant Bit,” Pelita Informatika Budi Darma, vol.VI, no.1, 2014.

M. Yunus, and A. Harjoko, “Penyembunyian Data pada File Video Menggunakan Metode LSB dan DCT,” IJCCS, vol.8, no.1, 2014

H.A.Siregar, “Implementasi Metode Hybrid Cryptosystem untuk Pengamanan Transminsi Data Pajak Studi Kasus Pajak RSUD Bangkinang,” UIN SUSKA RIAU, 2014

M. Jain, and A. Agrawal, “Implementation of hybrid cryptography algorithm,” International Journal Of Core Engineering & Management(IJCEM), vol.1, no.3, 2014

K.A. Sekarwati, and A. Budiman, “Implementasi Algoritma Rivest-Shamir-Adleman (RSA) dan Metode Least Significant Bit(LSB) Untuk Keamanan File Teks dan Dokumen Menggunakan Visual C#,” Jurnal Teknologi Rekayasa, vol.22, no.1, 2017

A. Arief and R. Saputra, “Implementasi Kriptografi Kunci Publik dengan Algoritma RSA-CRT pada Aplikasi Instant Messaging”, Scientific Journal of Informatics, vol. 3, no. 1, pp. 46-54. 2016

R.S. Basuki, and E.N. Maranggi, “Embedding Pesan Rahasia Dengan Metode LSB,” in Seminar Nasional Teknologi Informasi & Komunikasi Terapan 2011 (Semantik 2011), 2011




DOI: https://doi.org/10.30591/jpit.v5i3.2050

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

JPIT INDEXED BY

  
  

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.