Penerapan Metode Steganografi One Domain (OD) Untuk Keamanan Penyisipan Data Pada File Gambar
Abstract
Full Text:
PDF (Bahasa Indonesia)References
. Autoimager.
http://www.autoimager.com/download.asp. Diakses
pada 1 September 2015
. Ansari, Munawir. (2015).Komparasi Metode Hybrid
Image Watermarking DWT-SVD Dengan RDWTSVD
Untuk Proteksi Pada Citra Digital. Yogyakarta,
fakultas Teknologi Industri, Universitas Islam
Indonesia.
. Boora & Gambhir. (2013). Arnold Transform
Based Steganography. International Journal of Soft
Computing and Engineering (IJSCE). ISSN: 2231-
, Volume-3, Issue-4.
. Cheddad, A., Condell, J., Curran, K., Kevitt, P.Mc.,
Digital Image Steganography : Survey and
Analysis of Current Methods. Signal Processing,
Elsevier. Northern Ireland, UK.
. Gutte, Chincholkar and Lahane. (2013).
Steganography For Two And Three Lsbs Using
Extended Using Extended Substitution Algorithm.
Ictact Journal On Communication Technology,
March 2013, volume: 04, issue: 01.
. Haldankar & Kuwelkar. (2014). Implementation Of
Aes And Blowfish Algorithm. International Journal
of Research in Engineering and Technology eISSN:
-1163 | pISSN: 2321-7308.
. Padmaa. & Venkataramani. (2014). Encypted Secret
OD With Image Steganography For Enhanced
Imperceptibility Dan Capacity. Tamilnadu India.
. Poornima & Iswarya. (2013). AN OVERVIEW OF
DIGITAL IMAGE STEGANOGRAPHY.
International Journal of Computer Science &
Engineering Survey (IJCSES) Vol.4, No.1,February
. SIPI, The USC-SIPI Image Database, website pada
http://sipi.usc.edu, diakses pada 24 Agustus 2015.
. Wijaya, Wijaya Satriya. (2014). Integrasi Metode
Steganografi LSB Pada Image Dengan Kriptografi
Blowfish. Yogyakarta, fakultas Teknologi Industri,
Universitas Islam Indonesia.
. Wijaya, Satriya. & Prayudi, Yudi. (2014). Konsep
hidden message menggunakan teknik steganografi
dynamic cell spreading. Jurnal media informatika,
ISSN: 0854-4743, Volume 2. NO. 1, PP 23-38.
. Yadav. (2011). Information Security Using OD of
Steganography and Cryptography. Int. J. Comp.
Tech. Appl., Vol 2 (6), 2023-2036. ISSN:2229-6093
. Kumar and Karthikeyan. 2012. Investigating the
Efficiency of Blowfish and Rejindael (AES)
Algorithms. I. J. Computer Network and
Information Security, 2012, 2, 22-28. DOI:
5815/ijcnis.2012.02.04
DOI: http://dx.doi.org/10.36564/njca.v1i1.8
DOI (PDF (Bahasa Indonesia)): http://dx.doi.org/10.36564/njca.v1i1.8.g7
Refbacks
- There are currently no refbacks.
Copyright (c) 1970 Rahmad Zainul Abidin

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.