{"title":"实现数据安全的混合算法和最低有效位方法","authors":"Ibnu Sulistyo, Eko Aribowo","doi":"10.30591/JPIT.V5I3.2050","DOIUrl":null,"url":null,"abstract":"Computer networks can improve the quality of communication; however, it also allows accessing data illegally. Unauthorized access to people’s data can cause harm. In order for the data to remain safe, the cryptographic algorithm encryption process is needed. Nevertheless, there is also a disadvantage of encryption which can lead to suspicions. To get rid of unnecessary suspicion, there is a need for steganography algorithms, and one way of making sure that it is hidden is by using the least significant bit method. This research uses a hybrid algorithm and the least significant bit technique. Hybrid algorithm models are used for better security before being concealed under the image, and the only way of doing that is by using least significant bit method. The types of image files used are PNG and JPG or JPEG. The success rate of this experiment is 100%, with eight tests that have been done with a maximum insertion of 5000 characters.","PeriodicalId":53375,"journal":{"name":"Jurnal Informatika Jurnal Pengembangan IT","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementasi Algoritma Hybrid dan Metode Least Significant Bit Untuk Keamanan Data\",\"authors\":\"Ibnu Sulistyo, Eko Aribowo\",\"doi\":\"10.30591/JPIT.V5I3.2050\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computer networks can improve the quality of communication; however, it also allows accessing data illegally. Unauthorized access to people’s data can cause harm. In order for the data to remain safe, the cryptographic algorithm encryption process is needed. Nevertheless, there is also a disadvantage of encryption which can lead to suspicions. To get rid of unnecessary suspicion, there is a need for steganography algorithms, and one way of making sure that it is hidden is by using the least significant bit method. This research uses a hybrid algorithm and the least significant bit technique. Hybrid algorithm models are used for better security before being concealed under the image, and the only way of doing that is by using least significant bit method. The types of image files used are PNG and JPG or JPEG. The success rate of this experiment is 100%, with eight tests that have been done with a maximum insertion of 5000 characters.\",\"PeriodicalId\":53375,\"journal\":{\"name\":\"Jurnal Informatika Jurnal Pengembangan IT\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Jurnal Informatika Jurnal Pengembangan IT\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30591/JPIT.V5I3.2050\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Informatika Jurnal Pengembangan IT","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30591/JPIT.V5I3.2050","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementasi Algoritma Hybrid dan Metode Least Significant Bit Untuk Keamanan Data
Computer networks can improve the quality of communication; however, it also allows accessing data illegally. Unauthorized access to people’s data can cause harm. In order for the data to remain safe, the cryptographic algorithm encryption process is needed. Nevertheless, there is also a disadvantage of encryption which can lead to suspicions. To get rid of unnecessary suspicion, there is a need for steganography algorithms, and one way of making sure that it is hidden is by using the least significant bit method. This research uses a hybrid algorithm and the least significant bit technique. Hybrid algorithm models are used for better security before being concealed under the image, and the only way of doing that is by using least significant bit method. The types of image files used are PNG and JPG or JPEG. The success rate of this experiment is 100%, with eight tests that have been done with a maximum insertion of 5000 characters.