2019
DOI: 10.36982/jig.v9i2.561
|View full text |Cite
|
Sign up to set email alerts
|

Aplikasi Pengamanan Informasi Menggunakan Metode Least Significant Bit (Lsb) dan Algoritma Kriptografi Advanced Encryption Standard (AES)

Abstract: <p align="center"><strong><em>Abstract</em></strong></p><p><em>There are several security aspects of the data that must be maintained, such as: authentication, integrity, non repudiation, authority, confidentialty, privacy and access control. One of the vulnerable parts of data security is when sending data to the destination. At the time of delivery, tapping of data can occur, so that people who are not entitled to get that information can find out. Ther… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
4

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 0 publications
0
6
0
4
Order By: Relevance
“…The method used in this study uses a qualitative method where the researcher is the main tool in data collection [14]. The data collection that the author does is by looking for reference sources related to the research topic, both from scientific journals and from books.…”
Section: Research Methods 31 Data Collectionmentioning
confidence: 99%
“…The method used in this study uses a qualitative method where the researcher is the main tool in data collection [14]. The data collection that the author does is by looking for reference sources related to the research topic, both from scientific journals and from books.…”
Section: Research Methods 31 Data Collectionmentioning
confidence: 99%
“…The encryption process is carried out using an algorithm with several parameters. (Novianto & Setiawan, 2019) Base64 transformation is one of the algorithms for encoding and decoding a data into ASCII format, which is based on the base number 64 or can be said to be one of the methods used to encode (encoding) binary data. according to (Novianto & Setiawan, 2019) quoted by Gunadhi, et al (Novianto & Setiawan, 2019)Base64 transformation is one of the algorithms for encoding and decoding data into ASCII format, which is based on the base 64 number or be said to be one of the methods used to encode binary data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…(Novianto & Setiawan, 2019) Base64 transformation is one of the algorithms for encoding and decoding a data into ASCII format, which is based on the base number 64 or can be said to be one of the methods used to encode (encoding) binary data. according to (Novianto & Setiawan, 2019) quoted by Gunadhi, et al (Novianto & Setiawan, 2019)Base64 transformation is one of the algorithms for encoding and decoding data into ASCII format, which is based on the base 64 number or be said to be one of the methods used to encode binary data. Base64 transformation cryptography is widely used in the Internet world as a media data format for sending data, this use is because the results of the base64 encode are plaintext, so this data will be much easier to send, compared to binary data formats.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Whereas, if the LSB bit is 0, then all bits in the byte are replaced with 0 bits so that the byte value is 00000000 (binary) or 0 (decimal). After the filtering process, the image in the image not inserted by the message will approach the original image [10]. While the part of the image containing the secret message will become corrupted after filtering.…”
Section: Enhanced Lsbmentioning
confidence: 99%