PERANCANGAN ENKRIPSI KEAMANAN DATA MENGGUNAKAN METODE LEAST SIGNIFICANT BIT DENGAN TEKNIK MODIFIKASI RANDOM DATA ENCRYPT ALGORITHM UNTUK AUDIO STEGANOGRAPHY
Abstract
Keywords
Full Text:
PDFReferences
M. Asad, J. Gilani, and A. Khalid, “An Enhanced Least Significant Bit Modification Technique for Audio Steganography,†Univ. Eng. Technol. Taxila, pp. 143–147, 2011.
M. Baritha Begum and Y. Venkataramani, “LSB Based Audio Steganography Based On Text Compression,†Procedia Eng., vol. 30, no. 2011, pp. 703–710, 2012, doi: 10.1016/j.proeng.2012.01.917.
A. Bhattacharya and S. Banerjee, “Reversible Data Encryption Algorithm,†CSE Dep. Herit. Inst. Technol. / Kolkata, pp. 40–43, 2012.
C. Liu, J. Ji, and Z. Liu, “Implementation of DES Encryption Arithmetic based on FPGA,†AASRI Procedia, vol. 5, pp. 209–213, 2013, doi: 10.1016/j.aasri.2013.10.080.
V. F. Ramadhani and B. Hidayat, “STEGANALISIS UNTUK FILE AUDIO BERFORMAT MP3 DENGAN METODE LEAST SIGNIFICANT BIT ( LSB ) PADA KLASIFIKASI PRINCIPAL COMPONENT ANALYSIS ( PCA ),†pp. 1–6, 2017.
K. Gopalan, “Audio steganography using bit modification,†2003 Int. Conf. Multimed. Expo. ICME ’03. Proc. (Cat. No.03TH8698), pp. I–629, 2003, doi: 10.1109/ICME.2003.1220996.
A. Budi and A. Chicali, “ANALISIS PERBANDINGAN ALGORITMA KRIPTOGRAFI METODE DATA ENCRYPTION STANDARD DENGAN METODE ADVANCED ENCRYPTION SYSTEM (STUDI KASUS PADA PT. ONE STANDARD GROUP PTE LTD),†J. Inform. dan Bisnis, vol. 8, 2019.
E. Algorithm, “FUndtim Data,†Twenty Second Natl. Radio Sci. Conf., no. Nrsc, 2005.
K. Gopalan, “Audio Steganography by Cepstrum Modification,†Dep. Electr. Comput. Eng. Purdue Univ. Calumet, vol. 4323, no. 3, pp. 481–484, 2005.
R. Sridevi, “EFFICIENT METHOD OF AUDIO STEGANOGRAPHY BY MODIFIED LSB ALGORITHM AND STRONG ENCRYPTION,†Sch. Inf. Technol. JNTUH, Hyderabad, 2009.
L. D. P. W. E. and T. Bertin-Mahieux, “Dataset Audio.†http://millionsongdataset.com/pages/additional-datasets/index.html.
I. Kurniawan, “Implementasi dan Studi Perbandingan Steganografi pada File Audio WAVE Menggunakan Teknik Low-Bit Encoding dengan Teknik End Of File,†J. Informatics Technol., vol. 2, no. 3, pp. 0–11, 2013.
DOI: https://doi.org/10.35334/jeb.v6i2.1649
Refbacks
- There are currently no refbacks.
Address: Gedung D Lt. 3 Kampus Universitas Borneo Tarakan. Jl. Amal Lama No. 1, Tarakan, Kalimantan Utara, Indonesia. Kodepos: 77123. Email:elektrika@borneo.ac.id
| All Publications by JEB (Jurnal Elektrika Borneo) are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License |