PENGAMANAN PESAN SANDI MENGGUNAKAN KOMBINASI METODE ENKRIPSI VIGENERE DAN METODE STEGANOGRAFI LEAST SIGNIFICANT BIT (LSB) DENGAN TEKNIK DISTRIBUSI PESAN LINEAR CONGRUENTIAL GENERATOR (LCG)

SYUHADA, AHMAD SYAUQI and Arsalan, Osvari and Kurniati, Rizki (2023) PENGAMANAN PESAN SANDI MENGGUNAKAN KOMBINASI METODE ENKRIPSI VIGENERE DAN METODE STEGANOGRAFI LEAST SIGNIFICANT BIT (LSB) DENGAN TEKNIK DISTRIBUSI PESAN LINEAR CONGRUENTIAL GENERATOR (LCG). Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_55201_09021281924087.pdf] Text
RAMA_55201_09021281924087.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_55201_09021281924087_TURNITIN.pdf] Text
RAMA_55201_09021281924087_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (9MB) | Request a copy
[thumbnail of RAMA_55201_09021281924087_0028068806_0012079104_01_front_ref.pdf] Text
RAMA_55201_09021281924087_0028068806_0012079104_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (1MB)
[thumbnail of RAMA_55201_09021281924087_0028068806_0012079104_02.pdf] Text
RAMA_55201_09021281924087_0028068806_0012079104_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (278kB) | Request a copy
[thumbnail of RAMA_55201_09021281924087_0028068806_0012079104_03.pdf] Text
RAMA_55201_09021281924087_0028068806_0012079104_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (101kB) | Request a copy
[thumbnail of RAMA_55201_09021281924087_0028068806_0012079104_04.pdf] Text
RAMA_55201_09021281924087_0028068806_0012079104_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (663kB) | Request a copy
[thumbnail of RAMA_55201_09021281924087_0028068806_0012079104_05.pdf] Text
RAMA_55201_09021281924087_0028068806_0012079104_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (97kB) | Request a copy
[thumbnail of RAMA_55201_09021281924087_0028068806_0012079104_06.pdf] Text
RAMA_55201_09021281924087_0028068806_0012079104_06.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (12kB) | Request a copy
[thumbnail of RAMA_55201_09021281924087_0028068806_0012079104_07_ref.pdf] Text
RAMA_55201_09021281924087_0028068806_0012079104_07_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (85kB) | Request a copy
[thumbnail of RAMA_55201_09021281924087_0028068806_0012079104_08_lamp.pdf] Text
RAMA_55201_09021281924087_0028068806_0012079104_08_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (56kB) | Request a copy

Abstract

The exchange of information, still vulnerable amid technological advancements, prompts software developers to enhance digital security strategies. This research conducts experiments by combining three layers of security—Vigenere encryption, Least Significant Bit (LSB) method, and Linear Congruential Generator (LCG) method—as a solution to improve digital security. To assess the accuracy of the security model, the generated images are measured using Peak Signal-to-Noise Ratio (PSNR) calculations. Information is encrypted using Vigenere encryption, which encrypts each plaintext character in the input data with a different key. The encrypted data is then concealed in the least significant bits of color pixels using the LSB method. Augmented with the LCG method to randomly distribute the data bits within the bits of a PNG image, enhancing overall security. The images resulting from all processes are then evaluated by examining the matrix of the generated image (PSNR). A higher PSNR value indicates a better-quality image, and vice versa. All data hidden within the images can be retrieved precisely as the original condition when needed. The data used in this study consists of KPM photos in PNG format, with variations of hidden data in TXT format. All experiments conducted were successfully re-extracted only if the correct keywords were entered. The average PSNR value obtained from the experiments reached 77.230.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: kriptografi, steganografi, enkripsi vigenere, least significant bit (LSB), linear congruential generator (LCG)
Subjects: Q Science > Q Science (General) > Q334-342 Computer science. Artificial intelligence. Algorithms. Robotics. Automation.
Q Science > QA Mathematics > QA1-43 General
T Technology > T Technology (General) > T10.5-11.9 Communication of technical information
T Technology > T Technology (General) > T58.5-58.64 Information technology > T58.6.E9 Management information systems -- Congresses.
Divisions: 09-Faculty of Computer Science > 55201-Informatics (S1)
Depositing User: Ahmad Syauqi Syuhada
Date Deposited: 21 Dec 2023 07:20
Last Modified: 21 Dec 2023 07:20
URI: http://repository.unsri.ac.id/id/eprint/135480

Actions (login required)

View Item View Item