OPTIMALISASI SISTEM KEAMANAN DATA UNTUK JENIS FILE DOKUMEN MENGGUNAKAN TEKNIK STEGANOGRAFI END OF FILE, ALGORITMA KRIPTOGRAFI RIVEST CODE 6, DAN ALGORITMA KOMPRESI HUFFMAN

Mochammad Nauval Rifkiansyah, . (2021) OPTIMALISASI SISTEM KEAMANAN DATA UNTUK JENIS FILE DOKUMEN MENGGUNAKAN TEKNIK STEGANOGRAFI END OF FILE, ALGORITMA KRIPTOGRAFI RIVEST CODE 6, DAN ALGORITMA KOMPRESI HUFFMAN. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.

[img] Text
ABSTRAK.pdf

Download (10kB)
[img] Text
AWAL.pdf

Download (949kB)
[img] Text
BAB I.pdf

Download (247kB)
[img] Text
BAB II.pdf
Restricted to Repository UPNVJ Only

Download (623kB)
[img] Text
BAB III.pdf
Restricted to Repository UPNVJ Only

Download (233kB)
[img] Text
BAB IV.pdf
Restricted to Repository UPNVJ Only

Download (2MB)
[img] Text
BAB V.pdf

Download (129kB)
[img] Text
DAFTAR PUSTAKA.pdf

Download (131kB)
[img] Text
DAFTAR RIWAYAT HIDUP.pdf
Restricted to Repository UPNVJ Only

Download (16kB)
[img] Text
LAMPIRAN.pdf
Restricted to Repository UPNVJ Only

Download (14MB)
[img] Text
ARTIKEL KI.pdf
Restricted to Repository staff only

Download (1MB)

Abstract

Security and confidentiality of data is an important aspect in the field of communication, especially communication using computer media. Data security processes that are widely circulated include using cryptography, steganography and compression. Making this application uses a combination of three algorithms, namely cryptography which is a mathematical study that has a relationship with information security aspects such as data integration, entity authenticity, and data authenticity. The cryptographic method that will be used is the Rivest Code 6 algorithm. Apart from file security issues, size or size issues must also be considered because most files that have gone through the locking process become larger in size than the file. Therefore, the author also uses the Huffman compression method which makes the file size minimized after the file is locked in this file security cryptography application. The last combination in the method used is steganography, where steganography is widely used to send a message without being noticed by others by using digital media in the form of image files. The method used in this steganography is the End Of File method where file insertion is done at the end of the image that is the place for insertion. The results of this study state that combining the three algorithms can maintain confidentiality and not damage the contents of the information contained in the data. In addition, there will be an increase in file size after data locking, where an increase in the size of the file resulting from the locking process occurs depending on the size of the secret data and container file.

Item Type: Thesis (Skripsi)
Additional Information: [No. Panggil: 1710511005] [Pembimbing 1: Anita Muliawati] [Pembimbing 2: Bayu Hananto] [Penguji 1: Henki Bayu Seta] [Penguji 2: I Wayan Widi P]
Uncontrolled Keywords: Data Security, Steganography (End of File), Cryptography, RC6 Algorithm, Huffman.
Subjects: T Technology > T Technology (General)
Divisions: Fakultas Ilmu Komputer > Program Studi Informatika (S1)
Depositing User: Mochammad Nauval Rifkiansyah
Date Deposited: 21 Dec 2021 07:42
Last Modified: 21 Dec 2021 07:42
URI: http://repository.upnvj.ac.id/id/eprint/11234

Actions (login required)

View Item View Item