Abstract

Along with the development of technology and information today, data security is a problem that needs to be done to maintain the confidentiality of data or information both personally and within an organization. Cryptography is one of the sciences or arts that learns about how to secure data or information from irresponsible parties who want to destroy important data in the form of text and image files. This research, data security technique uses two algorithms, namely steganography to enter text in image media using LSB (Least Significant Bit) method and Binary XOR used to convert messages to binary with XOR keywords and generate pixel values of messages from 8 bits of images with LSB (Least Significant Bit). After encrypted the image will be sent to the user, and to view the original data, the user must decrypt the data with the message key and retrieve the LSB (Least Significant Bit) value, from the encrypted image.

Highlights

  • arbitrarily dismantle the system used by users

  • Data or text that has been inserted in the next image will be sent to the recipient

  • the recipient of the message must decrypt the data with the same key

Read more

Summary

Introduction

Penelitian selanjutnya yaitu kriptografi data sederhana dengan Metode Exlusive-OR (XOR) penelitian ini menguraikan langkah-langkah kriptografi dengan XOR yang diimplementasi ke teknik kriptografi modern dengan kunci simetris metode XOR pada proses enkripsi dan dekripsi kemudian melakukan konversi pesan dan kata kunci ke bilangan biner yang menghasilkan plaintext yang di konversi karakter berdasarkan kode ASCII [4]. Berdasarkan flowchart pada gambar 3 diatas dapat dijelaskan enkripsi adalah teks asli (Plaintext) dan kata kunci dikonversi ke bilangan biner untuk menghasilkan XOR Binary yang disisipkan kedalam bit-bit gambar melalui segmen pixel yang terdiri dari 8bit ke LSB (Least Significant Bit), kemudian flowchart dekripsi untuk membuka teks yang di enkripsi dan konversi menjadi karakter sehingga teks asli dapat dibaca.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call