IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI

Providing security and confidentiality to information is needed when exchanging information through communication networks. It is intended that the information sent by the sender can be received in full by the recipient without any interference from parties who are not interested in the information....

Full description

Bibliographic Details
Main Authors: Ely Setyo Astuti, Binar Prihadmantyo, Meyti Eka Apriyani
Format: Article
Language:Indonesian
Published: Politeknik Negeri Jember 2019-04-01
Series:J-TIT (Jurnal Teknologi Informasi dan Terapan)
Online Access:http://jtit.polije.ac.id/index.php/jtit/article/view/61
id doaj-83f9b2ffb0464672b71d4c48b634c6da
record_format Article
spelling doaj-83f9b2ffb0464672b71d4c48b634c6da2020-11-25T03:54:22ZindPoliteknik Negeri JemberJ-TIT (Jurnal Teknologi Informasi dan Terapan)2354-838X2580-22912019-04-0142677410.25047/jtit.v4i2.6161IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASIEly Setyo AstutiBinar PrihadmantyoMeyti Eka ApriyaniProviding security and confidentiality to information is needed when exchanging information through communication networks. It is intended that the information sent by the sender can be received in full by the recipient without any interference from parties who are not interested in the information. Cryptographic techniques and steganography can be used to secure confidential messages. Building applications that combine these two techniques can provide security for confidential messages well. Security techniques that can be used are cryptographic techniques using the RC4 algorithm to secure secret messages in the form of text or images, and insert secret messages with 2LSB steganography method into audio media. The analysis carried out is the level of success of the message insertion and extraction process, process speed, stego audio attack, and audio quality. The results of 18 times insertion testing and message extraction, obtained a success percentage of 100% with different processing times depending on the size of the message being inserted. The resulting Stego audio has good quality and does not cause noise that can be heard directly by the human senses, but stego audio cannot withstand attacks that cause changes to the stego file byte value. So it can be concluded that the combination of the RC4 cryptographic algorithm and the 2LSB steganography method can secure the message properly and provide the results of decryption without any changes to the inserted messagehttp://jtit.polije.ac.id/index.php/jtit/article/view/61
collection DOAJ
language Indonesian
format Article
sources DOAJ
author Ely Setyo Astuti
Binar Prihadmantyo
Meyti Eka Apriyani
spellingShingle Ely Setyo Astuti
Binar Prihadmantyo
Meyti Eka Apriyani
IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI
J-TIT (Jurnal Teknologi Informasi dan Terapan)
author_facet Ely Setyo Astuti
Binar Prihadmantyo
Meyti Eka Apriyani
author_sort Ely Setyo Astuti
title IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI
title_short IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI
title_full IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI
title_fullStr IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI
title_full_unstemmed IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI
title_sort implementasi algoritma kriptografi rc4 dan metode steganografi audio 2lsb pada sistem keamanan informasi
publisher Politeknik Negeri Jember
series J-TIT (Jurnal Teknologi Informasi dan Terapan)
issn 2354-838X
2580-2291
publishDate 2019-04-01
description Providing security and confidentiality to information is needed when exchanging information through communication networks. It is intended that the information sent by the sender can be received in full by the recipient without any interference from parties who are not interested in the information. Cryptographic techniques and steganography can be used to secure confidential messages. Building applications that combine these two techniques can provide security for confidential messages well. Security techniques that can be used are cryptographic techniques using the RC4 algorithm to secure secret messages in the form of text or images, and insert secret messages with 2LSB steganography method into audio media. The analysis carried out is the level of success of the message insertion and extraction process, process speed, stego audio attack, and audio quality. The results of 18 times insertion testing and message extraction, obtained a success percentage of 100% with different processing times depending on the size of the message being inserted. The resulting Stego audio has good quality and does not cause noise that can be heard directly by the human senses, but stego audio cannot withstand attacks that cause changes to the stego file byte value. So it can be concluded that the combination of the RC4 cryptographic algorithm and the 2LSB steganography method can secure the message properly and provide the results of decryption without any changes to the inserted message
url http://jtit.polije.ac.id/index.php/jtit/article/view/61
work_keys_str_mv AT elysetyoastuti implementasialgoritmakriptografirc4danmetodesteganografiaudio2lsbpadasistemkeamananinformasi
AT binarprihadmantyo implementasialgoritmakriptografirc4danmetodesteganografiaudio2lsbpadasistemkeamananinformasi
AT meytiekaapriyani implementasialgoritmakriptografirc4danmetodesteganografiaudio2lsbpadasistemkeamananinformasi
_version_ 1724474103753080832