IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI
Providing security and confidentiality to information is needed when exchanging information through communication networks. It is intended that the information sent by the sender can be received in full by the recipient without any interference from parties who are not interested in the information....
Main Authors: | , , |
---|---|
Format: | Article |
Language: | Indonesian |
Published: |
Politeknik Negeri Jember
2019-04-01
|
Series: | J-TIT (Jurnal Teknologi Informasi dan Terapan) |
Online Access: | http://jtit.polije.ac.id/index.php/jtit/article/view/61 |
id |
doaj-83f9b2ffb0464672b71d4c48b634c6da |
---|---|
record_format |
Article |
spelling |
doaj-83f9b2ffb0464672b71d4c48b634c6da2020-11-25T03:54:22ZindPoliteknik Negeri JemberJ-TIT (Jurnal Teknologi Informasi dan Terapan)2354-838X2580-22912019-04-0142677410.25047/jtit.v4i2.6161IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASIEly Setyo AstutiBinar PrihadmantyoMeyti Eka ApriyaniProviding security and confidentiality to information is needed when exchanging information through communication networks. It is intended that the information sent by the sender can be received in full by the recipient without any interference from parties who are not interested in the information. Cryptographic techniques and steganography can be used to secure confidential messages. Building applications that combine these two techniques can provide security for confidential messages well. Security techniques that can be used are cryptographic techniques using the RC4 algorithm to secure secret messages in the form of text or images, and insert secret messages with 2LSB steganography method into audio media. The analysis carried out is the level of success of the message insertion and extraction process, process speed, stego audio attack, and audio quality. The results of 18 times insertion testing and message extraction, obtained a success percentage of 100% with different processing times depending on the size of the message being inserted. The resulting Stego audio has good quality and does not cause noise that can be heard directly by the human senses, but stego audio cannot withstand attacks that cause changes to the stego file byte value. So it can be concluded that the combination of the RC4 cryptographic algorithm and the 2LSB steganography method can secure the message properly and provide the results of decryption without any changes to the inserted messagehttp://jtit.polije.ac.id/index.php/jtit/article/view/61 |
collection |
DOAJ |
language |
Indonesian |
format |
Article |
sources |
DOAJ |
author |
Ely Setyo Astuti Binar Prihadmantyo Meyti Eka Apriyani |
spellingShingle |
Ely Setyo Astuti Binar Prihadmantyo Meyti Eka Apriyani IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI J-TIT (Jurnal Teknologi Informasi dan Terapan) |
author_facet |
Ely Setyo Astuti Binar Prihadmantyo Meyti Eka Apriyani |
author_sort |
Ely Setyo Astuti |
title |
IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI |
title_short |
IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI |
title_full |
IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI |
title_fullStr |
IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI |
title_full_unstemmed |
IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI |
title_sort |
implementasi algoritma kriptografi rc4 dan metode steganografi audio 2lsb pada sistem keamanan informasi |
publisher |
Politeknik Negeri Jember |
series |
J-TIT (Jurnal Teknologi Informasi dan Terapan) |
issn |
2354-838X 2580-2291 |
publishDate |
2019-04-01 |
description |
Providing security and confidentiality to information is needed when exchanging information through communication networks. It is intended that the information sent by the sender can be received in full by the recipient without any interference from parties who are not interested in the information.
Cryptographic techniques and steganography can be used to secure confidential messages. Building applications that combine these two techniques can provide security for confidential messages well. Security techniques that can be used are cryptographic techniques using the RC4 algorithm to secure secret messages in the form of text or images, and insert secret messages with 2LSB steganography method into audio media.
The analysis carried out is the level of success of the message insertion and extraction process, process speed, stego audio attack, and audio quality. The results of 18 times insertion testing and message extraction, obtained a success percentage of 100% with different processing times depending on the size of the message being inserted. The resulting Stego audio has good quality and does not cause noise that can be heard directly by the human senses, but stego audio cannot withstand attacks that cause changes to the stego file byte value. So it can be concluded that the combination of the RC4 cryptographic algorithm and the 2LSB steganography method can secure the message properly and provide the results of decryption without any changes to the inserted message |
url |
http://jtit.polije.ac.id/index.php/jtit/article/view/61 |
work_keys_str_mv |
AT elysetyoastuti implementasialgoritmakriptografirc4danmetodesteganografiaudio2lsbpadasistemkeamananinformasi AT binarprihadmantyo implementasialgoritmakriptografirc4danmetodesteganografiaudio2lsbpadasistemkeamananinformasi AT meytiekaapriyani implementasialgoritmakriptografirc4danmetodesteganografiaudio2lsbpadasistemkeamananinformasi |
_version_ |
1724474103753080832 |