PENERAPAN STEGANOGRAFI DENGAN METODE LSB (LEAST SIGNIFICANT BIT) DAN ALGORITMA KRIPTOGRAFI TWOFISH UNTUK PENGAMANAN FILE

Along with the rapid development of technology, data security is also needed. This is necessary to avoid crimes committed by irresponsible parties. Data security and confidentiality is very important for the company. This research was conducted to provide file security for the Elfa Furniture company...

Full description

Saved in:
Bibliographic Details
Main Author: Dini Nursafitri, (Author)
Format: Book
Published: 2021-07-20.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_11131
042 |a dc 
100 1 0 |a Dini Nursafitri, .  |e author 
245 0 0 |a PENERAPAN STEGANOGRAFI DENGAN METODE LSB (LEAST SIGNIFICANT BIT) DAN ALGORITMA KRIPTOGRAFI TWOFISH UNTUK PENGAMANAN FILE 
260 |c 2021-07-20. 
500 |a http://repository.upnvj.ac.id/11131/1/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/11131/2/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/11131/3/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/11131/4/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/11131/5/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/11131/6/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/11131/7/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/11131/8/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/11131/9/RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/11131/10/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/11131/11/ARTIKEL%20KI.pdf 
520 |a Along with the rapid development of technology, data security is also needed. This is necessary to avoid crimes committed by irresponsible parties. Data security and confidentiality is very important for the company. This research was conducted to provide file security for the Elfa Furniture company in the process of storing the price quote file. Therefore, it takes a system to secure the file. In this study, file security is carried out using the Twofish cryptographic algorithm and steganography techniques using the LSB (Least Significant Bit) method. The results obtained from this study are in the form of an application for securing a price quote file that is kept by the company which is confidential, from a party who has no authority over the file. The conclusion obtained form this study is that the LSB method causes a change in the size of the cover image file after the message file is inserted, which is experiencing a change in the average size of twice the size before the message file is inserted. However, it did not experience significant changes when viewed visually, so as not to arouse suspicion by other parties. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a QA Mathematics 
690 |a QA75 Electronic computers. Computer science 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/11131/ 
787 0 |n http://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/11131/  |z Link Metadata