OPTIMALISASI SISTEM KEAMANAN DATA UNTUK JENIS FILE DOKUMEN MENGGUNAKAN TEKNIK STEGANOGRAFI END OF FILE, ALGORITMA KRIPTOGRAFI RIVEST CODE 6, DAN ALGORITMA KOMPRESI HUFFMAN

Security and confidentiality of data is an important aspect in the field of communication, especially communication using computer media. Data security processes that are widely circulated include using cryptography, steganography and compression. Making this application uses a combination of three...

Full description

Saved in:
Bibliographic Details
Main Author: Mochammad Nauval Rifkiansyah, (Author)
Format: Book
Published: 2021-07-23.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Security and confidentiality of data is an important aspect in the field of communication, especially communication using computer media. Data security processes that are widely circulated include using cryptography, steganography and compression. Making this application uses a combination of three algorithms, namely cryptography which is a mathematical study that has a relationship with information security aspects such as data integration, entity authenticity, and data authenticity. The cryptographic method that will be used is the Rivest Code 6 algorithm. Apart from file security issues, size or size issues must also be considered because most files that have gone through the locking process become larger in size than the file. Therefore, the author also uses the Huffman compression method which makes the file size minimized after the file is locked in this file security cryptography application. The last combination in the method used is steganography, where steganography is widely used to send a message without being noticed by others by using digital media in the form of image files. The method used in this steganography is the End Of File method where file insertion is done at the end of the image that is the place for insertion. The results of this study state that combining the three algorithms can maintain confidentiality and not damage the contents of the information contained in the data. In addition, there will be an increase in file size after data locking, where an increase in the size of the file resulting from the locking process occurs depending on the size of the secret data and container file.
Item Description:http://repository.upnvj.ac.id/11234/14/ABSTRAK.pdf
http://repository.upnvj.ac.id/11234/24/AWAL.pdf
http://repository.upnvj.ac.id/11234/16/BAB%20I.pdf
http://repository.upnvj.ac.id/11234/17/BAB%20II.pdf
http://repository.upnvj.ac.id/11234/18/BAB%20III.pdf
http://repository.upnvj.ac.id/11234/19/BAB%20IV.pdf
http://repository.upnvj.ac.id/11234/20/BAB%20V.pdf
http://repository.upnvj.ac.id/11234/21/DAFTAR%20PUSTAKA.pdf
http://repository.upnvj.ac.id/11234/22/DAFTAR%20RIWAYAT%20HIDUP.pdf
http://repository.upnvj.ac.id/11234/23/LAMPIRAN.pdf
http://repository.upnvj.ac.id/11234/11/ARTIKEL%20KI.pdf