scholarly journals Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital

2016 ◽  
Vol 4 (3) ◽  
pp. 470 ◽  
Author(s):  
Alim Muadzani ◽  
Oky Dwi Nurhayati ◽  
Ike Pertiwi Windasari

Information has now become an  important comodity in human life, with the rapid development of communications technology has enable people to communicate and exchange information more easily. Internet is very popular and used by billions users worldwide, the information passing through the internet is very large, and some certain people trying to get this information for profit. The information need to be secured to prevent the others to get the information that send through the internet, steganography can be used to  hide the information before sending it and the receiver can recover the hidden data. Digital steganography using computer can use a variety of digital file, digital image file is one of them. With the infomation being hidden inside the image-carrier, the others will not aware about the hidden information. Application created using C# programming leanguage and the steganoraphy method using Least Significant Bit Insertion (LSBI). Microsoft Visual Studio used as Integrated Development Environtment (IDE) to code and design the user interface. Software develpment model using Extreme Programming, and the testing using black box method. Application designed to hide text or image inside an image-carrier and the hidden text or image can be recovered. The result of this research are an application that can hide text or image into  image-carrier, and the hidden text or image can be recovered. Based on the testing application can run as expected and fulfill all the requirements. 

Author(s):  
Zbigniew M. Bzymek

Abstract The world’s technology is developing very rapidly. To anticipate the course and results of such development is a task that is very crucial for the success of many technological undertakings and expansions. Engineering design is the branch of engineering that should predict the results of that rapid development. It should equip society with the tools for directing and controlling that development. It is a complex task that faces big challenges. The main challenge comes from society advancement and from the technology development itself. If the directing and controlling are done right the development would bring many benefits to humanity and would make human life easier and more comfortable. Doing it right however requires increased knowledge of the new features of technology and more skills in its application. In the difficult pandemic situation that knowledge and skills should be even greater because the outbreak of the disease creates additional traps and dangers. These conditions have to be taken under consideration and accepted as normal. The role of engineering design is to predict what harmful elements would be coming from both technological and social sources. The real goal however would be to exceed the expectations and not only neutralize them but change them from harmful into neutral, and then from neutral into friendly and helpful. Such actions follows recommendations of BTIPS (Brief Theory of Inventive Problem Solving) and is outlined in the BTIPS’s module “Prediction”. At the same time the developing civilization brings dangers for humans that were unknown before. These are bacterial and viruses’ attacks that limit personal relations between humans, requires new ways and new elements of communications, especially in internet contacts and in distant learning procedures. The contents of these components should be accurately predicted, well-orchestrated, well designed and precisely described. Recommendations for introducing BTIPS as a tool of engineering education in new situation should be carefully proposed and illustration examples, using new communication tools, should be developed. These should be applied in engineering theoretical courses and in practical applications during the senior design course of study and in industrial practice. This should be precise, clearly anticipating difficulties, pointing possible errors and ways of avoiding them. Teaching examples of problem solving and personal ways of communications between individual students, between groups of students, as well as between students and instructors should be further discussed. The examples of design ideas and problem solutions generated by students in design courses that were described in previous works of the author and his co-workers [1] should be related to pandemic situation. To define and formulate rules of teaching BTIPS in the pandemic situation is the necessity of our times. On every step of our lives we face the challenge of preventing harms and destruction that can be done by the contemporary surrounding world. The preventing actions can be designed by following rules of BTIPS and by apply approach recommended in its modules. The proposal of utilizing BTIPS application examples using the internet as a tool of expression is described in this paper. All of these are pointed out and some recommendations and examples are called. Adding description of corrections to the engineering curriculum is necessary in the new situation. It is an intention of the author to demonstrate a fragment of practical distant lecturing by internet during the IMECE 2020 internet sessions using the internet network and distant support from UConn computer Laboratory in Storrs, CT. Some example solutions of the idea generation are quoted in this paper. The comments coming from author’s teaching experience will be given during the presentation and practical advices for students and instructors will be passed to the audience. This paper is a companion to IMECE 2017-70438 [1]. Some original examples given in the paper 79418 are recommended for following and will be run by internet in pandemic situation of IMECE 2020.


2014 ◽  
Vol 599-601 ◽  
pp. 2036-2039
Author(s):  
Le Hui Huang ◽  
Bin Gui

The rapid development of the internet has deeply changed the way of human life and learning. As an important learning concept being promoting in domestic and foreign education in recent years, the mode of research learning is changing with the development of internet. The paper summarizes the basis connotation of research learning, the advantages and disadvantages of implementing research learning by the internet, and matters needing to pay attention to in research learning under the network environment.


2021 ◽  
Vol 11 (2) ◽  
pp. 396-405
Author(s):  
Dr.V. Vennila ◽  
L.I. Poomani ◽  
S. Thaaranya

In the field of computer networks, cryptography and steganography are the well-known features for best security purpose. The main idea is to transmit the data securely. So, providing acceptable level of security is essential for data transmission. Also it should reduce the time complexity of the security algorithm. Here we have employed the “Elliptic Curve Cryptography” scheme to encrypt the data and image. A “Least Significant Bit” steganography algorithm is used to insert the encrypted data to be hidden inside the image in order to send the data securely. The encrypted data from the image is then decrypted by the decryption algorithm. Finally the hidden data is taken from the decrypted data. Then the image is compressed before sending through the internet. MATLAB is utilized to mimic outcomes which show that it has great inserting limit and security.


PALAPA ◽  
2017 ◽  
Vol 5 (2) ◽  
pp. 53-77
Author(s):  
Muhasim Muhasim

Perkembangan tehnologi digital merupakan hasil rekayasa akal, pikiran dan kecerdasan manusia, yang tercermin dalam kemajuan ilmu pengetahuan, selanjutnya memberikan manfaat dalam segala aspek kehidupan manusia. Dalam perkembangan komunikasi manusia telah berhasil membawa kemajuan yang sangat pesat. The development of digital technologies is the result of engineering intellect, mind and human intelligence, which is reflected in the advancement of science, and provides benefits in all aspects of human life. In the development of human communication has managed to bring a very rapid progression, from communication to manually change into analog, digital, where technology has provided ease in communicating quickly, without alimited distance, space and time through the Internet. Based on the data of Internet users in Indonesia 2016 as much as 132.7 million people from a total population of Indonesia as much as 256.2 million people, certainly the year 2017 is much more rapid development. From the results of a survey by the Association of organizers of Internet network , revealed that, on average, through the Internet in Indonesia 67.2 million or 50.7 percent, to access via mobile devices and the computer. In West NusaTenggara as many as 3.3 million or 64 percent. The number of internet users from 80 percent of who mareaged 15-19 years, meaning the teenage is still recorded as learners. Therefore the purpose of this paper is to find out how digital technology benefits against the motivation of learners. The method use disdescriptive qualitative studies. As the analysis of data and information furnished observations, document definitions obtained from books written by experts and scripts through social media or the Internet. Discussion of the results obtained positive influence motivation towards learning digital technology learners. With a fixed geared to anticipate the negative influence posed that can disrupt moral behavior, and thus a threat motivation learning learners. Because energy must begiven Faith, discipline on an ongoing basis, in order to take advantage of positive tehnology digital to enhance learning motivation of learners.


Author(s):  
Tena Velki ◽  
Ksenija Romstein

In the last decade, the Internet has become a crucial part of human life. Everyday usage of the Internet has enabled rapid development of social engineering. The weakest link in this chain are naive users with their risky online behavior who are unaware of Internet security risks. As knowledge, awareness and behavior depend on human characteristics, such as maturity, age and education, the main goal of this study was to investigate trendlines of user risky behavior and security awareness through the lifespan. Results have shown the growth of online risky behavior through the lifespan and the growth of knowledge and security awareness in middle adulthood. In general, we can conclude that people who are more knowledgeable about and more aware of potential security risks are at the same time more prone to risky behavior when using information systems.


2019 ◽  
Vol 2 (1) ◽  
pp. 67-79 ◽  
Author(s):  
Umar Al Faruqi

With the rapid development of technology in the digitalization era, Industry 4.0 became a terminology that became a reference for research and development in the field of technology in various sectors. This continues to trigger all people to develop technology to enable better utilization in facilitating human life. Society 5.0 is an idea that explains the revolution in people's lives with the development of the fourth industrial revolution. The concept that wants to be presented is how there is a revolution in society that both utilizing technology and also considering humanities aspects. Some sectors of work and needs are beginning to enter digitalization that utilizes Artificial Intelligence, Big Data, Robotics, Automation, Machine Learning, and the Internet of Things.


2015 ◽  
Vol 7 (2) ◽  
pp. 144-153
Author(s):  
Lilik Indrawati

The education process is basically the transfer of information. The rapid development of information technology have an impact on human life, especially education. Its positive impact is closely linked to improved quality of life. Information facing ASEAN Economic Community (AEC) is so easily obtained either through the mass media, electronics, as well as through a network of  internet technology. The Internet is a network of information, communication, and various sources are not infinite number of which can be used to help users produce a final project, thesis, thesis, dissertation, project work, and so on. Internet as a tool for achieving information on a global scale. Users can now obtain more information than what is contained in the textbooks by searching and accessing all websites around the world. Especially for the students, with the internet which is easily accessible anywhere, using either WIFI or a particular provider, making it easier for students to obtain data or news from domestic and foreign news. Students may also work on assignments, tests, and develop materials that have been received in the lecture. Thus, more extensive knowledge of students.


2021 ◽  
Vol 2 (36) ◽  
pp. 52-56
Author(s):  
Evgeniy V. Shabanov ◽  

The article reveals the problem of the influence of information technologies on personal development of bachelors at a university, in particular, the relationship between the development of the Internet and a person’s self-esteem. The urgency of this problem is primarily due to the rapid development of information technologies and their introduction into almost every aspect of human life. The results of the study of the relationship between the level of self-esteem of bachelors in the university and the degree of development of the Internet are presented. The survey respondents are future bachelors in teacher training universities. The research methods were a questionnaire survey, revealing the degree of mastery of the Internet, and a self-assessment technique (a modification of the DemboRubinstein technique). The results of the study showed that information technologies actively used on the Internet have a significant impact on the success of the formation of self-esteem of a student. It in turn suggests the relationship between the level of formation of technological competence and the development of the personality of the future teacher. Keywords: digital economy, information technology, Internet, self-esteem, bachelor’s degree


2018 ◽  
Vol 4 (1) ◽  
pp. 57
Author(s):  
Yuli Anwar ◽  
Dahlar .

Abstract. One of the advances in information technology that now has changed the outlook and human life, business process and business strategy of an institution is the internet. The internet is a very large networks that connected to computers and serves throughout the world in one centralized network. With the internet we can access data and information anytime and anywhere.    As one provider of high-speed data communications services and the pioneer of the internet network service provider in Indonesia that provides integrated services, as well as one of the pioneer development of internet services that provide extensive services in the building and apply it throughout Indonesia. Indosat ready to seize opportunities for sustainable growth of business spectrum are still sprawling Indonesia.    Therefore, Indosat continues to focus on the development of increased efforts to provide the best service for customers of Indosat. Indosat will continue to develop and expand network coverage and a larger investment that the company will achieve excellence in the field of integrated telecommunications services.    Ranking by region of the IP Providers can be seen by grouping IP Providers, and management over IP Providers prefer to choose providers based on where it orginates as an example for the region of the U.S if it will be preferred providers that come from U.S. providers.With the commencement of the internet network optimization start early in 2008 with the selection of the appropriate IP Upstream Provider criteria, it is up to date according to data obtained from Indosat, seen any significant changes to the cost of purchasing capacity of the IP Upstream.    Based on the data obtained that until Q3 or September 2008, the number of IP Upstream Providers that previously there were 20 to 10 IP Upstream Provider, IP Transit Price total decrease of 11% to the price of IP Transit Price / Mbps there is a decrease of 78%, while from the capacity bandwith an increase of 301% capacity from 2008.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Sign in / Sign up

Export Citation Format

Share Document