Securing and Concealing Messages in the Edge Area of Digital Images Using Least Significant Bit Method and Blowfish Algorithm
Abstract
Full Text:
PDFReferences
M. M. Hariady, A. Suyatno, and I. F. Astuti, "Keamanan dan Penyisipan Pesan Rahasia Pada Gambar Dengan Enkripsi Blowfish Dan Steganografi End Of File,"
C. Irawan, D. R. I. M. Setiadi, C. A. Sari, and E. H. Rachmawanto, "Hiding and securing message on edge areas of image using LSB steganography and OTP encryption," in 2017 1st International Conference on Informatics and Computational Sciences (ICICoS), 2017, pp. 1-6, doi: 10.1109/ICICOS.2017.8276328.
M. K. Harahap and N. Khairina, "Analisis Algoritma One Time Pad Dengan Algoritma Cipher Transposisi Sebagai Pengamanan Pesan Teks," Sinkron: Jurnal Dan Penelitian Teknik Informatika, vol. 1, no. 2, pp. 58-62, 2017. [Online]. Available: https://doi.org/10.33395/sinkron.v1i2.42.
S. Sukatmi, "Perbandingan Deteksi Tepi Citra Digital Dengan Metode Prewitt, Sobel dan Canny," KOPERTIP : Jurnal Ilmiah Manajemen Informatika dan Komputer, vol. 01, no. 01, pp. 1-4, 2017.
Octamanullah Mohamad. Perbandingan Algoritma Kriptografi Kunci Simetrik BlowFish dan TwoFish
K. Joshi, S. Gill and R. Yadav, "A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image," Journal of Computer Networks and Communications, pp. 1-11, 2018.
J. K. Mandal, Reversible Steganography and Authentication via Transform Encoding, Springer, 2020.
N. Khairina and M. K. Harahap, "Menjaga Kerahasiaan Data dengan Steganografi Kombinasi LSB-2 dengan LSB-3," SinkrOn - Jurnal & Penelitian Teknik Informatika , vol. 3, no. 1, pp. 286-288, 2018.
G. Chen, H. Zhao, C. K. Pang, T. Li and C. Pang, "Image Scaling: How Hard Can It Be?," IEEE Access, vol. 7, pp. 129452-129465, 2019.
R. Munir, Pengolahan Citra Digital Menggunakan Pendekatan Algoritmik. Bandung: Informatika, 2005.
A. Pranata and E. ZuniAstuti, "Pengolahan Citra Berbasis Deteksi Tepi Prewitt Pada Gambar Gigi Manusia," Jurnal Eksplora Informatika, vol. 6, no. 2, pp. 98-105, 2017. [Online]. Available: https://mail.eksplora.stikom-bali.ac.id/index.php/eksplora/article/view/110
Refbacks
- There are currently no refbacks.