- J. J. Prihatmoko, Mendemokratiskan Pemilu Dari Sistem Sampai Elemen Teknis. Semarang: Pustaka Pelajar, 2007
- H. Hamid and E. Suandi, Memperkokoh Otonomi Daerah: Kebijakan, Evaluasi dan Saran. Yogyakarta: UII Press, 2004
- S. Maulana, 5 Proyek Populer SMS Gateway. Jakarta: PT Elex Media Komputindo, 2015
- T. Mantoro, A. A. Media, and S. Munawwarah, “Securing the Authentication and Message Integrity for Smart Home Using Smartphone,” in 2014 International Conference on Multimedia Computing and System, Marrakech, Morocco, Apr. 2014, pp. 985-989
- F. P. Juniawan, “RSA Implementation for Data Transmission Security in BEM Chairman E-voting Android based Application,” in 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, Aug. 2016, pp. 93-98
- S. N. Neyman, I. N. P. Pradnyana, and B. Sitohang, “A New Copyright Protection for Vector Map Using FFT-based Watermarking,” Telkomnika, vol. 12, no. 2, pp. 367-378, 2014
- A. H. Kridalaksana, E. Arriyanti, and W. Widodo, “Aplikasi Pengaman SMS dengan Metode Kriptografi Advanced Encryption Standard (AES) 128 Berbasis Android,” Sebatik, vol. 10, no. 1, pp. 8-14, 2013
- H. Bodur and R. Kara, “Secure SMS Encryption Using RSA Encryption Algorithm on Android Message Application,” in 3rd International Symposium On Innovative Technologies In Engineering And Science, Valencia, Spain, Jun. 2015
- A. R. Alvianto and D. Darmaji, “Pengaman Pengiriman Pesan Via SMS dengan Algoritma RSA Berbasis Android,” Jurnal Sains dan Seni ITS, vol. 4, no. 1, pp. A1-A6, 2015
- E. R. Sardju, R. Magdalena, and R. D. Atmaja, “Implementasi Algoritma RSA untuk Enkripsi dan Dekripsi SMS (Short Message Service) Pada Ponsel Berbasis Android,” e-Proceeding of Engineering, vol.2, no.2. pp. 2435-2442, 2015
- S. Sugiyanto and R. K. Hapsari, “Pengembangan Algoritma Advanced Encryption Standard Pada Sistem Keamanan SMS Berbasis Android Menggunakan Algoritma Vigenere,” Jurnal Ultimatics, vol. 8, no. 2, pp. 131-138, 2016
- A. Ginting, R. R. Isnanto, and I. P. Windasari, "Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email," Jurnal Teknologi dan Sistem Komputer, vol. 3, no. 2, pp. 253-258, 2015
- W. P. Atmojo, R. R. Isnanto, and R. Kridalukmana, "Implementasi Aplikasi Kriptografi Pada Layanan Pesan Singkat (SMS) Menggunakan Algoritma RC6 Berbasis Android," Jurnal Teknologi dan Sistem Komputer, vol. 4, no. 3, pp. 450-453, 2016
- A. E. Handoyo, D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari, and A. Susanto,The message encryption and decryption process produce the appropriate ciphertext and plaintext. "Teknik Penyembunyian dan Enkripsi Pesan pada Citra Digital dengan Kombinasi Metode LSB dan RSA," Jurnal Teknologi dan Sistem Komputer, vol. 6, no. 1, pp. 37-43, 2018
- A. Arief and R. Saputra, "Implementasi Kriptografi Kunci Publik dengan Algoritma RSA-CRT pada Aplikasi Instant Messaging," Scientific Journal of Informatics, vol. 3, no. 1, pp. 46-54, 2016
- R. L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signature and Public Key Cryptosystems. Massachusets: MIT, 1977
Last update: 2021-03-05 23:24:58
-
RC4 Algorithm and Steganography to Double Secure Messages in Digital Image
Rahmat Sulaiman, Chandra Kirana, Tri Sugihartono, Laurentinus, Fransiskus Panca Juniawan.
2020 8th International Conference on Cyber and IT Service Management (CITSM),
2020.
doi: 10.1109/CITSM50537.2020.9268833
Last update: 2021-03-05 23:24:59
-
RC4 Algorithm and Steganography to Double Secure Messages in Digital Image
Rahmat Sulaiman, Chandra Kirana, Tri Sugihartono, Laurentinus, Fransiskus Panca Juniawan.
2020 8th International Conference on Cyber and IT Service Management (CITSM),
2020.
doi: 10.1109/CITSM50537.2020.9268833
Copyright (c) 2019 Jurnal Teknologi dan Sistem Komputer

This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Starting in 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that their article is original, written by the mentioned author(s), has never been published before, does not contain statements that violate the law, does not violate the rights of others, is subject to copyright that is held exclusively by the author(s), and is free from the rights of third parties, and that the necessary written permission to quote from other sources has been obtained by the author(s).
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
- Copyright and other proprietary rights related to articles, such as patents,
- The right to use the substance of the article in its own future works, including lectures and books,
- The right to reproduce articles for its own purposes,
- The right to archive articles yourself (please read our deposit policy), and
- The right to enter into separate additional contractual arrangements for the non-exclusive distribution of published versions of articles (for example, posting them to institutional repositories or publishing them in a book), with acknowledgment of its initial publication in this journal (Journal of Technology and Computer Systems).
If the article was prepared jointly by more than one author, each author submitting the manuscript warrants that they have been given permission by all co-authors to agree to copyright and license notices (agreements) on their behalf, and agree to notify the co-authors of the terms of this policy. JTSiskom will not be held responsible for anything that may arise because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that once published, their articles (and any additional files, including data sets, and analysis/computation data) will become publicly available. The license of published articles (and additional data) will be governed by the Creative Commons Attribution license as currently featured on the Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.