Pengiriman Pesan dalam File Gambar dengan Metode RC6 dan LSB Menggunakan Android

Sartono Sartono, Riyan Apriyanto, Fandy Kurniawan

Abstract


The development of digital media rapidly and its use covering various areas give rise to the demands of an increasingly large to create an information delivery system can be secured process of securing information can be done by hiding the information to other media or by a particular method, so people do not realize there is an information in the media. Technique known as Steganography, Steganography is a technique to hide or disguise the existence of secret messages in media containers. Changing common message (plaintext) into an encrypted message (ciphertext). with cryptographic methods. The combination of these two methods can be used for security messages into media images, so that the message can be converted into encrypted messages once can disembunyikan.Untuk open the message inserted in this image is used to unlock the secret key simultaneously translate pesan.Aplikasi will be built using android that implements the methods Steganography Simple subsitutions least significant bit (LSB) and cryptography Rivest Code 6 (RC6). The use of steganography and cryptography technology is expected to improve security in the process of delivering information, in order to get important information, will be masked its presence on a media image. It is also expected to assist in the protection of copyright works of electronic media.


Full Text:

PDF

References


David, Murtado A. dan Kasma Utin.Steganography Gambar Dengan

MetodeLeast Significant Bit Untuk ProteksiKomunikasi Pada

Media Online. Program Studi Teknik Informatika, Sekolah Tinggi

Manajemen Informatika dan KomputerPontianak. 2012.

Menezes, A, VanOorschot, P, Vanstone, S. 1997.Handbook of Applied

Cryptography. CRC Press, Inc.

Michael Siregar, Ivan, Membongkar Source Code berbagai Aplikasi

Android, Halaman 227, Gava Media, Yogyakarta.

Munir, Rinaldi, Steganografi dan Kriptografi, Halaman 301, Informatika, Bandung, 2006

Singh, Gurpreet. dan Supriya. 2013. A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security.IJCA.

(19): 0975-8887.

Westfeld Andreas. Steganalysis in the Presence of Weak Cryptography and Encoding. Technische Universitat Dres den Institute for

System Architecture, Germany.2006.


Refbacks

  • There are currently no refbacks.