Implementasi Algoritma Twofish Dan Hc-128 Pada Proses Steganografi Gambar Dengan Metode F5 Untuk Pengamanan Pesan

Indah, Cahyani (2020) Implementasi Algoritma Twofish Dan Hc-128 Pada Proses Steganografi Gambar Dengan Metode F5 Untuk Pengamanan Pesan. Undergraduate Thesis thesis, Institut Teknologi Telkom Purwokerto.

[img]
Preview
Text
ABSTRACT.pdf - Accepted Version

Download (300kB) | Preview
[img]
Preview
Text
ABSTRAK.pdf - Accepted Version

Download (512kB) | Preview
[img]
Preview
Text
COVER.pdf - Accepted Version

Download (3MB) | Preview
[img]
Preview
Text
BAB I.pdf - Accepted Version

Download (483kB) | Preview
[img]
Preview
Text
BAB II.pdf - Accepted Version

Download (760kB) | Preview
[img]
Preview
Text
BAB III.pdf - Accepted Version

Download (307kB) | Preview
[img] Text
BAB IV.pdf - Accepted Version
Restricted to Registered users only

Download (2MB)
[img]
Preview
Text
BAB V.pdf - Accepted Version

Download (314kB) | Preview
[img]
Preview
Text
DAFTAR PUSTAKA.pdf - Accepted Version

Download (425kB) | Preview

Abstract

The high number of cyber crime crimes can have serious and serious impacts and losses. Therefore, system security is necessary to maintain data security, especially if the data is confidential data. The most suitable technique to be applied in data security is cryptography, this technique is often combined with steganography techniques. In this study, a cryptographic technique was used with two different algorithms, namely the Twofish algorithm and the HC-128 algorithm. The use of the Twofish algorithm is based because it has a flexible and simple design and has no key weaknesses, while the HC-128 algorithm is an algorithm that can generate 128-bit secret keys and 128-bit initialization vectors. In addition, the F5 method is used to apply the steganography technique, where the F5 method is a method that is able to maintain the characteristics of the DCT histogram quite well and is quite superior in terms of capacity. Based on the test results, the message insertion can be done well and the damage caused by the message insertion is not too large because in the Peak Signal to Noise Ratio (PSNR) test, the results obtained are worth 30.20–31.37 dB. Keywords - Data Security, Twofish, HC-128, F5, PSNR.

Item Type: Thesis (Undergraduate Thesis)
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Industrial Engineering and Informatics > Informatics Engineering
Depositing User: pustakawan ittp
Date Deposited: 09 Jun 2021 01:23
Last Modified: 09 Jun 2021 01:23
URI: http://repository.ittelkom-pwt.ac.id/id/eprint/6034

Actions (login required)

View Item View Item