Department of Informatics, Universitas Dian Nuswantoro, Indonesia
BibTex Citation Data :
@article{JTSISKOM12989, author = {Antonius Erick Handoyo and De Rosal Ignatius Moses Setiadi and Eko Hari Rachmawanto and Christy Atika Sari and Ajib Susanto}, title = {Teknik Penyembunyian dan Enkripsi Pesan pada Citra Digital dengan Kombinasi Metode LSB dan RSA}, journal = {Jurnal Teknologi dan Sistem Komputer}, volume = {6}, number = {1}, year = {2018}, keywords = {Steganography;cryptography;LSB;RSA;image encryption}, abstract = { This study proposed a combination of steganography and cryptography techniques using LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to digital imagery. Digital image pixel values range from 0 to 255, making the keys used in RSA limited enough and less secure. So in this study, it is proposed to convert pixel image value to 16 bits so that the key used can be more varied. Experimental results proved that there was a steady increase in security and imperceptibility. This was shown by the results of PSNR 57.2258dB and MSE 0.1232dB. This method was also resistant to salt and pepper attacks. }, issn = {2338-0403}, pages = {37--43} doi = {10.14710/jtsiskom.6.1.2018.37-43}, url = {https://jtsiskom.undip.ac.id/article/view/12989} }
Refworks Citation Data :
This study proposed a combination of steganography and cryptography techniques using LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to digital imagery. Digital image pixel values range from 0 to 255, making the keys used in RSA limited enough and less secure. So in this study, it is proposed to convert pixel image value to 16 bits so that the key used can be more varied. Experimental results proved that there was a steady increase in security and imperceptibility. This was shown by the results of PSNR 57.2258dB and MSE 0.1232dB. This method was also resistant to salt and pepper attacks.
Article Metrics:
Last update:
Implementation of vigenere cipher 128 and square rotation in securing text messages
Kombinasi Least Significant Bit (LSB-1) Dan Rivest Shamir Adleman (RSA) Dalam Kriptografi Citra Warna
Last update: 2024-11-03 13:17:26
Starting from 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JTSiskom will not be held responsible for anything arising because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.