Penerapan Algoritma Hill Cipher dan Least Significant Bit (LSB) untuk Pengamanan Pesan pada Citra Digital
DOI:
https://doi.org/10.14421/jiska.2020.43-01Abstract
Nowadays people exchange information in digital media such as text, audio, video and imagery. The development of Information and Communication makes the delivery of information and data more efficient. Current developments in technology which are very significant have an impact on the community in exchanging information and communicating. Confidential hidden data can also be in the form of image, audio, text, or video. The Hill Chiper algorithm uses a matrix of size m x m as a key for encryption and decryption. One way to recover the original text is of course to guess the decryption key, so the process of guessing the decryption key must be difficult. break ciphertext into palintext without knowing which key to use. The LSB part that is converted to the value of the message to be inserted. After affixing a secret message, each pixel is rebuilt into a whole image that resembles the original image media. The Hill Cipher algorithm is used to determine the position of the plaintext encryption into a random ciphertext. 2. Testing text messages using the hill cipher algorithm successfully carried out in accordance with the flow or the steps so as to produce a ciphertext in the form of randomization of the letters of the alphabet.
References
M. M. Amin, 2016. Implementasi Kriptografi Klasik Pada Komunikasi Berbasis Teks, Jurnal Pseudocode, Volume III Nomor 2, September hal. 129-136.
Supiyanto. 2015. Implementasi Hill Cipher Pada Citra Menggunakan Koefisien Binomial Sebagai Matriks Kunci, Supiyanto, Seminar Nasional Informatika UPN ”Veteran” Yogyakarta, hal. 284-292.
Anita S, RMS. 2019. Sistem Bilangan Digital, 1, Serang Banten, CV. AA. Rizky.
Satriya, T, C, K., Dedih, Supriyadi, Implementasi Kriptografi Algoritma Rivest Shamir Adleman dengan Playfair Cipher pada Pesan Teks Berbasis Android, JOIN (Jurnal Online Informatika), Volume 2 No. 2, hal : 102-109.
Abdul H, H. 2013. Implementasi Algoritma Hill Cipher Dalam Penyandian Data, Pelita Informatika Budi Darma, Volume : IV, Nomor : 2.
Anita, S, RM, Sinaga. 2017. Implementasi Teknik Threshoding Pada Segmentasi Citra Digital, Jurnal Manajemen Dan Informatika Pelita Nusantara, Volume 1 No 2 hal : 48-51.
Indra, G. Sumarno. Eka, I. Heru, S, T. 2017. Pengamanan Berkas Dokumen Menggunakan Fungsi Algoritma Steganografi LSB, Jurnal Informatika Mulawarman, Vol. 12, No. 2.
Niria, L. Anita, S, RMS. 2018. Implementasi Steganografi LSB Dengan Enkripsi Vigenere Cipher Pada Citra, ScientiCO : Computer Science Informatics Journal Vol. 1, No. 2, hal : 47-58.
Anita, S, S. 2017. SEGMENTASI RUANG WARNA L*a*b Jurnal Mantik Penusa Vol. 3, No. 1 , pp. 43-46.
Rohmat, N, I. Ilham. MS. 2017. PERANCANGAN APLIKASI STEGAKRIP DENGAN METODE LSB DAN ALGORITMA RSA BERBASIS WEB, Jurnal Computech & Bisnis, Vol. 11, No 1, 98-109.
Downloads
Additional Files
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms as stated in http://creativecommons.org/licenses/by-nc/4.0
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.