Modifikasi Enkripsi Gambar Menggunakan 64-Bit Kunci pada Algoritma Data Encryption Standard (DES)
Ibnu Utomo Wahyu Mulyono(1), Wellia Shinta Sari(2), De Rosal Ignatius Moses Setiadi(3), Christy Atika Sari(4*)(1) Teknik Informatika, Universitas Dian Nuswantoro Semarang
(2) Teknik Informatika, Universitas Dian Nuswantoro Semarang
(3) Teknik Informatika, Universitas Dian Nuswantoro Semarang
(4) Teknik Informatika, Universitas Dian Nuswantoro Semarang
(*) Corresponding Author
Abstract
Keywords
Full Text:
PDFReferences
C. A. Sari, E. H. Rachmawanto, D. W. Utomo, and R. R. Sani, “Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting,†Int. J. Appl. Intell. Syst., vol. 1, no. 3, pp. 179–190, 2016.
A. Al-haj and H. Abdel-nabi, “Digital Image Security Based on Data Hiding and Cryptography,†in International Conference on Information Management Copyright, 2017, pp. 437–440.
Y. A. Gerhana, E. Insanudin, U. Syarifudin, and M. R. Zulmi, “Design of digital image application using vigenere cipher algorithm,†in 2016 4th International Conference on Cyber and IT Service Management, 2016, pp. 1–5.
G. Ardiansyah, C. A. Sari, D. Setiadi, and E. H. Rachmawanto, “Hybrid Method using 3-DES , DWT and LSB for Secure Image Steganography Algorithm,†in International Conference on Information Technology, Information Systems, and Electrical Engineering, 2017, pp. 248–253.
J. K. M. S. U. Zaman and R. Ghosh, “Randomized DES Using Irreducible Polynomial Over Galois Field GF,†Int. J. Adv. Res. Comput. Sci., vol. 4, no. 10, pp. 760–766, 2013.
D. P. Joseph and M. Krishna, “Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms,†Int. J. Adv. Res. Comput. Sci., vol. 6, no. 3, pp. 51–56, 2015.
B. Prasetiyo, G. Rahmat, and N. Beta, “Kombinasi Steganografi Bit Matching dan Kriptografi DES untuk Pengamanan Data,†Sci. J. Informatics, vol. 1, no. 1, pp. 79–93, 2014.
S. Garg, S. Khera, and A. Aggarwal, “Extended Vigenere Cipher with Stream Cipher,†Int. J. Eng. Sci. Comput., vol. 6, no. 5, pp. 5176–5180, 2016.
M. B. Pramanik, “Implementation of Cryptography Technique using Columnar Transposition,†pp. 19–23, 2014.
D. R. I. M. Setiadi, A. E. Handoyo, E. H. Rachmawanto, C. A. Sari, and A. Susanto, “Teknik Penyembunyian dan Enkripsi Pesan pada Citra Digital dengan Kombinasi Metode LSB dan RSA,†J. Teknol. dan Sist. Komput., vol. 6, no. 1, p. 37, Feb. 2018.
M. a. Faizal, H. B. Rahmalan, E. H. Rachmawanto, and C. A. Sari, “Impact Analysis for Securing Image Data using Hybrid SLT and DCT,†Int. J. Futur. Comput. Commun., vol. 1, no. 3, pp. 309–311, 2012.
A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,†Signal Processing, vol. 90, no. 3, pp. 727–752, Mar. 2010.
A. Hore and D. Ziou, “Image Quality Metrics: PSNR vs. SSIM,†in 2010 20th International Conference on Pattern Recognition, 2010, pp. 2366–2369.
Refbacks
- There are currently no refbacks.