KOMBINASI TRIPLE DATA ENCRYPTION STANDARD (3DES) DAN END OF FILE (EOF) PADA KRIPTO-STEGANO CITRA GRAYSCALE
Abstract
Keywords
Full Text:
PDFReferences
Abd Elminaam, D. S., Kader, H. M. A. and Hadhoud, M. M. (2010) ‘Evaluating the
performance of symmetric encryption algorithms’, International Journal of Network
Security, 10(3), pp. 213–219. doi: 10.7763/IJCTE.2009.V1.54.
Aleisa, N. (2015) ‘A Comparison of the 3DES and AES Encryption Standards’,
International Journal of Security and Its Applications, 9(7), pp. 241–246. doi:
14257/ijsia.2015.9.7.21.
Anggraini, Y. and Sakti, D. V. S. Y. (2014) ‘Penerapan Steganografi Metode End of File (
Eof ) Dan Enkripsi Metode Data Encryption Standard ( Des ) Pada Aplikasi
Pengamanan Data Gambar Berbasis Java’, in Konferensi Nasional Sistem Informasi,
STMIK Dipanegara Makassar, pp. 1743–1753.
Ardiansyah, G. et al. (2017) ‘Hybrid Method using 3-DES , DWT and LSB for Secure Image
Steganography Algorithm’, in 2017 2nd International Conferences on Information
Technology, Information Systems and Electrical Engineering (ICITISEE), pp. 248–
Ge, H., Huang, M. and Wang, Q. (2011) ‘Steganography and steganalysis based on digital
image’, in 2011 4th International Congress on Image and Signal Processing. Ieee, pp.
–255. doi: 10.1109/CISP.2011.6099953.
Iswahyudi, C., Setyaningsih, E. and Widyastuti, N. (2012) ‘Pengamanan kunci enkripsi citra
pada algoritma super enkripsi menggunakan metode end of file’, Prosiding Seminar
Nasional Aplikasi Sains & Teknologi (SNAST) Periode III, (November), pp. 278–285.
Kusuma, E. J. et al. (2017) ‘An Imperceptible LSB Image Hiding on Edge Region Using DES Encryption’, in International Conference on Innovative and Creative Information
Technology (ICITech), pp. 1–5.
Muslih and Rachmawanto, E. (2016) ‘PENGAMANAN FILE MULTIMEDIA DENGAN
METODE STEGANOGRAFI END OF FILE UNTUK MENJAGA’, Techno.COM,
(1), pp. 1–6.
Nilesh, D. and Nagle, M. (2014) ‘The new cryptography algorithm with high throughput’, in
International Conference on Computer Communication and Informatics. IEEE,
pp. 1–5. doi: 10.1109/ICCCI.2014.6921739.
Purnama Reza Dwi Oktaf, L. H. (2016) ‘Pengamanan Dokumen Teks Menggunakan
Algoritma Kriptografi Mode Operasi Cipher Block Chaining (Cbc) Dan Steganografi
Metode End of File (Eof)’, Techno.COM, 15(1), pp. 22–31.
Sari, C. A. and Rachmawanto, E. H. (2014) ‘Gabungan Algoritma Vernam Chiper Dan End
of File’, Techno.COM, 13(3), pp. 150–157.
Singh, G. and Supriya, S. (2013) ‘A Study of Encryption Algorithms (RSA, DES, 3DES and
AES) for Information Security’, International Journal of Computer Applications,
(19), pp. 33–38. doi: 10.5120/11507-7224.
Refbacks
- There are currently no refbacks.