KOMBINASI STEGANOGRAFI-KRIPTOGRAFI CITRA MENGGUNAKAN LSB DAN DES
Abstract
Keywords
Full Text:
PDFReferences
Anand, K., and Sharma, R., (2014), ‘Data Security using LSB and MSB Image
Steganography’, IJEE, 1(6), pp. 10–13.
Ardiansyah, G. et al., (2017), ‘Hybrid Method using 3-DES , DWT and LSB for Secure
Image Steganography Algorithm’, in 2017 2nd International Conferences on
Information Technology, Information Systems and Electrical Engineering (ICITISEE),
pp. 248–253.
Durga, K. V., Mamatha, G., and Bindu, C. H., (2015), ‘SVD based image watermarking with
firefly algorithm’, in 2015 International Conference on Computer Communication and
Informatics (ICCCI). IEEE, pp. 1–7. doi: 10.1109/ICCCI.2015.7218081.
Garg, R., and Gulati, T., (2012), ‘Comparison Of Lsb & Msb Based Steganography In GrayScale Images’, International Journal of Engineering Research & Technology (IJERT),
(8), pp. 1–6.
Irawan, C. et al., (2017), ‘Hiding and Securing Message on Edge Areas of Image using LSB
Steganography and OTP Encryption’, in International Conference on Informatics and
Computational Sciences (ICICoS).
Kurdi, M. M., Elzein, I. A., and Zeki, A. M., (2016), ‘Least Significant Bit (LSB) and
Random Right Circular Shift (RRCF) in Digital Watermarking’, in, pp. 111–116.
Kusuma, E. J. et al., (2017), ‘An Imperceptible LSB Image Hiding on Edge Region Using
DES Encryption’, in International Conference on Innovative and Creative Information
Technology (ICITech), pp. 1–5.
Prasetiyo, B., Rahmat, G., dan Beta, N., (2014), ‘Kombinasi Steganografi Bit Matching dan
Kriptografi DES untuk Pengamanan Data’, Scientific Journal of Informatics, 1(1), pp.
–93.
Rachmawanto, E. H., and Sari, C. A., (2015), ‘Keamanan File Menggunakan Teknik
Kriptografi Shift Cipher’, Techno.COM, 14(4), pp. 329–335.
Rahim, R., and Ikhwan, A., (2016), ‘Cryptography Technique with Modular Multiplication
Block Cipher and Playfair Cipher’, IJSRST, 2(6), pp. 71–78.
Savitri, D. I., (2006), ‘Analisis Keamanan Algoritma Kriptografi DES , Double DES , dan
Triple DES’, (13503081), pp. 1–15.
Refbacks
- There are currently no refbacks.