PENGAMANAN DAN PENYEMBUNYIAN PESAN PADA AREA TEPI DARI CITRA DIGITAL MENGGUNAKAN METODE LEAST SIGNIFICANT BIT DAN ALGORITMA BLOWFISH

NUR, ARVIANSYAH and Supardi, Julian and Rachmatullah, Muhammad Naufal (2023) PENGAMANAN DAN PENYEMBUNYIAN PESAN PADA AREA TEPI DARI CITRA DIGITAL MENGGUNAKAN METODE LEAST SIGNIFICANT BIT DAN ALGORITMA BLOWFISH. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_55201_09021281722033.pdf] Text
RAMA_55201_09021281722033.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[thumbnail of RAMA_55201_09021281722033_TURNITIN.pdf] Text
RAMA_55201_09021281722033_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (5MB) | Request a copy
[thumbnail of RAMA_55201_09021281722033_0010077210_0001129204_01_front_ref.pdf] Text
RAMA_55201_09021281722033_0010077210_0001129204_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (738kB)
[thumbnail of RAMA_55201_09021281722033_0010077210_0001129204_02.pdf] Text
RAMA_55201_09021281722033_0010077210_0001129204_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_55201_09021281722033_0010077210_0001129204_03.pdf] Text
RAMA_55201_09021281722033_0010077210_0001129204_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (211kB) | Request a copy
[thumbnail of RAMA_55201_09021281722033_0010077210_0001129204_04.pdf] Text
RAMA_55201_09021281722033_0010077210_0001129204_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (986kB) | Request a copy
[thumbnail of RAMA_55201_09021281722033_0010077210_0001129204_05.pdf] Text
RAMA_55201_09021281722033_0010077210_0001129204_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (552kB) | Request a copy
[thumbnail of RAMA_55201_09021281722033_0010077210_0001129204_06.pdf] Text
RAMA_55201_09021281722033_0010077210_0001129204_06.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (90kB) | Request a copy
[thumbnail of RAMA_55201_09021281722033_0010077210_0001129204_07_ref.pdf] Text
RAMA_55201_09021281722033_0010077210_0001129204_07_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (106kB) | Request a copy
[thumbnail of RAMA_55201_09021281722033_0010077210_0001129204_08_lamp.pdf] Text
RAMA_55201_09021281722033_0010077210_0001129204_08_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (57kB) | Request a copy

Abstract

The process of cryptography produces random text that can obscure a message, making it difficult for others to read. However, cryptography itself is still not strong enough to secure the message, so steganography is needed to conceal the existence of the message from the human eye. Besides hiding the message, another objective is to assess the impact of message embedding. In the process of encrypting and decrypting the message, the Blowfish algorithm is used, while message embedding utilizes the Least Significant Bit steganography, and edge detection is performed using the Canny algorithm. Through research conducted with the combination of cryptography and steganography, an excellent image is obtained with a PSNR value of 76.6932 and MSE of 0.0013 for a message length of 64 bytes. Meanwhile, visually, the results show a relatively similar appearance between the host image and the stego image.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: kriptografi, Blowfish, edge detection, Canny, steganografi, Least Significant Bit (LSB)
Subjects: Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation.
T Technology > T Technology (General) > T10.5-11.9 Communication of technical information
Divisions: 09-Faculty of Computer Science > 55201-Informatics (S1)
Depositing User: Arviansyah Nur
Date Deposited: 11 Aug 2023 05:30
Last Modified: 11 Aug 2023 05:30
URI: http://repository.unsri.ac.id/id/eprint/126936

Actions (login required)

View Item View Item