PENERAPAN STEGANOGRAFI DENGAN METODE LSB (LEAST SIGNIFICANT BIT) DAN ALGORITMA KRIPTOGRAFI TWOFISH UNTUK PENGAMANAN FILE
Along with the rapid development of technology, data security is also needed. This is necessary to avoid crimes committed by irresponsible parties. Data security and confidentiality is very important for the company. This research was conducted to provide file security for the Elfa Furniture company...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2021-07-20.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repoupnvj_11131 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Dini Nursafitri, . |e author |
245 | 0 | 0 | |a PENERAPAN STEGANOGRAFI DENGAN METODE LSB (LEAST SIGNIFICANT BIT) DAN ALGORITMA KRIPTOGRAFI TWOFISH UNTUK PENGAMANAN FILE |
260 | |c 2021-07-20. | ||
500 | |a http://repository.upnvj.ac.id/11131/1/ABSTRAK.pdf | ||
500 | |a http://repository.upnvj.ac.id/11131/2/AWAL.pdf | ||
500 | |a http://repository.upnvj.ac.id/11131/3/BAB%201.pdf | ||
500 | |a http://repository.upnvj.ac.id/11131/4/BAB%202.pdf | ||
500 | |a http://repository.upnvj.ac.id/11131/5/BAB%203.pdf | ||
500 | |a http://repository.upnvj.ac.id/11131/6/BAB%204.pdf | ||
500 | |a http://repository.upnvj.ac.id/11131/7/BAB%205.pdf | ||
500 | |a http://repository.upnvj.ac.id/11131/8/DAFTAR%20PUSTAKA.pdf | ||
500 | |a http://repository.upnvj.ac.id/11131/9/RIWAYAT%20HIDUP.pdf | ||
500 | |a http://repository.upnvj.ac.id/11131/10/LAMPIRAN.pdf | ||
500 | |a http://repository.upnvj.ac.id/11131/11/ARTIKEL%20KI.pdf | ||
520 | |a Along with the rapid development of technology, data security is also needed. This is necessary to avoid crimes committed by irresponsible parties. Data security and confidentiality is very important for the company. This research was conducted to provide file security for the Elfa Furniture company in the process of storing the price quote file. Therefore, it takes a system to secure the file. In this study, file security is carried out using the Twofish cryptographic algorithm and steganography techniques using the LSB (Least Significant Bit) method. The results obtained from this study are in the form of an application for securing a price quote file that is kept by the company which is confidential, from a party who has no authority over the file. The conclusion obtained form this study is that the LSB method causes a change in the size of the cover image file after the message file is inserted, which is experiencing a change in the average size of twice the size before the message file is inserted. However, it did not experience significant changes when viewed visually, so as not to arouse suspicion by other parties. | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
690 | |a QA Mathematics | ||
690 | |a QA75 Electronic computers. Computer science | ||
655 | 7 | |a Thesis |2 local | |
655 | 7 | |a NonPeerReviewed |2 local | |
787 | 0 | |n http://repository.upnvj.ac.id/11131/ | |
787 | 0 | |n http://repository.upnvj.ac.id | |
856 | 4 | 1 | |u http://repository.upnvj.ac.id/11131/ |z Link Metadata |