DC Field | Value | Language |
dc.contributor.author | edy, victor haryanto | - |
dc.date.accessioned | 2020-06-17T08:22:26Z | - |
dc.date.available | 2020-06-17T08:22:26Z | - |
dc.date.issued | 2019-01-01 | - |
dc.identifier.other | 10.1088/1742-6596/1361/1/012009 | - |
dc.identifier.uri | http://repository.potensi-utama.ac.id/jspui/jspui/handle/123456789/3415 | - |
dc.description | As time goes by, secrecy of messages for some people is very important in order to get data that is not
at all other people know. Very sensitive secrecy about the illegal stealing of messages, triggering some
people to convey the message's secrecy itself, in order to avoid threats from outsiders who want to
forcibly take the contents of a message that some people think is very important.
Today, there are many applications about maintaining the confidentiality of the message itself.
Maintaining the confidentiality of messages has been going on for a long time. People often call it
steganography, which is hiding messages on the media, such as pictures. For now, steganography has
been applied to the digital world such as computers. Steganography is generally use to hide
information in the image, where the information in the form of text is inserted into the bits making up
the image. With this method the author tries to combine the steganography method with other
methods.
Cryptography itself is a science or art to maintain the security of a data. In the cryptographic world the
same letter in the message has the same letter image as well. This has a high level of risk because it is
easy to guess. To resolve this so the message must be encoded (encoding). The goal is to be safe from
other people who want to take data contents illegally.
Hill cipher is one of the classic cryptographic methods that is often applied, hill ciphers apply simteric
keys that utilize the nxn matrix as the key. The hill cipher algorithm is manipulating words that use
matrix operations in the form of inverse multiplication.
Background retrieval regarding the hill cipher method and steganography itself is an application for
safeguarding data that is wanted to be secured by an interested person. The hill cipher method itself is
a classical cryptography or cryptography which uses the simteric key in its application, where this key
is a matrix, which contains the key of the hill cipher method itself then the key that has been applied in
the execution uses mod 26. This research also combines other methods namely lsb (significant bit list) where this method implements insertion of the lowest in-bit message in a digital image, where the
insertion is entered by the compiler bit of the message that you want to enter. | en_US |
dc.description.abstract | This research discusses encryption and security description of files in images with hill
cipher cryptography and steganogography using the lsb + 1 method, testing the results of
cryptographic and stegano data security applications that are equipped with cryptography, then
from the results the trial was done with the hill cipher method, by displaying data in the form of
files that want to do the data security. The results of the DIPA trial with a file size of 17.2 MB
after being encrypted into RNPF with a file size of 17.2 MB. | en_US |
dc.publisher | IOP Publishing | en_US |
dc.relation.ispartofseries | th5;1-6 | - |
dc.subject | hill cipher, lsb + 1, file | en_US |
dc.subject | cryptography, steganography, image | en_US |
dc.title | Application Of Hill Cipher And LSB + 1 Methods For Messaging In Messages Inpicture | en_US |
dc.type | Article | en_US |
Appears in Collections: |
|