STEGANOGRAFI DENGAN METODE LSB (LEAST SIGNIFICANT BIT) DAN METODE MMB (MULTIPICATION-BASED BLOCK CIPHER) UNTUK PENGAMANAN DATA BERBENTUK TEKS
DOI:
https://doi.org/10.29103/techsi.v7i2.188Abstract
Security and confidentiality of data and information is the most important aspect of human activity undertaken. One way to maintain the security and confidentiality of personal data and the group is through cryptography and steganography techniques are believed to provide protection to the data and information held on the parties concerned. Through the incorporation of cryptography and steganography is expected to improve security on the data and information. This research was conducted by combining methods MMB on cryptography and steganography method of LSB in that run on Windows-based operating systems and can only hide a message with .txt format bitmap image format. MMB method is the development of IDEA method that uses 128 bit keys along the subblok divided into four pieces, each of which has a length of 32 bits. LSB method is a method that inserts the last bit of each pixel with a bit of the message.References
. Ashur, Tomer. Orr Dunkelman, 2013. A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher. Springer International Publishing Switzerland.
. Jia, Keting. Jiaze Chen, Meiqin Wang, Xiaoyun Wang, 2012. Practical Attack on the Full MMB Block Cipher. Springer-Verlag Berlin Heidelberg.
. Katz, Jonathan. Yehuda Lindell, 2015. Intoduction to Modern Cryptography Second Edition. CRC Press.
. Rakhmat, Basuki. Muhammad Fairuzabadi, 2010. Steganografi Menggunakan Metode Least Significant Bit Dengan Kombinasi Algoritma Kriptografi Vigenere dan RC4.Jurnal Dinamika Informatika.
. Thangadurai, K. G.Sudha Devi, 2014. An analysis of LSB Based Image Steganography Techniques. International Conference on Computer Communication and Informatics (ICCCI).
Downloads
Published
Issue
Section
License
Authors retain copyright and grant the journal right of first publication and this work is licensed under a Creative Commons Attribution-ShareAlike 4.0 that allows others to share the work with an acknowledgement of the works authorship and initial publication in this journal.
All articles in this journal may be disseminated by listing valid sources and the title of the article should not be omitted. The content of the article is liable to the author.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
In the dissemination of articles by the author must declare the TECHSI Journal as the first party to publish the article.
