scholarly journals IMPLEMENTASI STEGANOGRAFI PADA TEKS TERENKRIPSI DENGAN ALGORITMA RSA MENGGUNAKAN METODE BPCS

2018 ◽  
Vol 7 (2) ◽  
pp. 260-265 ◽  
Author(s):  
Yulia Fatma ◽  
Harun Mukhtar ◽  
Muhammad Taufik

The internet network is growing rapidly and has a great impact on human life. The development of the internet network has enabled many people to exchange information or messages,one of tham by using email media. Apparently the internet is a path that in ni not too safe because it is a common communication media that can be used by everyone so prone to tapping information or messages. Therefore, security and confidentiality are needed in data communications. One may to keep messages safe is to use steganography technique. The steganography method used is the method of message insertion using BPCS (Bit Plane Complexity Segmentation). Before the message is inserted, the message is first encrypted using cryptography techniques. The cryptographic algorithm used is RSA algorithm. RSA algorithm consists of encryption algorithm and decryption algorithm. The confidential message is encrypted using RSA encryption algorithm and inserted using the insertion method of BPCS. With the technique of steganography on the image media then the delivery of a secret message will have a good level of security because it can not be detected directly by the senses of human vision. Keywords: cryptography, steganography, RSA, method BPCS   Abstrak Jaringan internet berkembang dengan pesat dan memberikan pengaruh besar bagi kehidupan manusia. Perkembangan jaringan Internet telah memungkinkan banyak orang untuk saling bertukar informasi atau pesan salah satunya dengan media email. Ternyata, internet merupakan jalur yang tidak terlalu aman karna merupakan media komunikasi umum yang dapat digunakan semua orang sehingga rawan penyadapan informasi atau pesan. Oleh karena itu, keamanan dan kerahasiaan sangat dibutuhkan dalam komunikasi data. Salah satu cara untuk menjaga keamanan pesan adalah menggunakan teknik steganografi. Metode steganografi yang digunakan adalah metode penyisipan pesan, dengan menggunakan metode BPCS (Bit Plane Complexity Segmentation). Sebelum pesan disisipkan terlebih dahulu pesan tersebut dienkripsi dengan menggunakan teknik kriptografi. Algoritma kriptografi yang digunakan adalah algoritma RSA. Algoritma RSA terdiri dari algoritma enkripsi dan algoritma dekripsi. Pesan rahasia disandikan menggunakan algoritma enkripsi RSA dan disisipkan menggunakan metode penyisipan BPCS. Dengan adanya teknik steganografi pada media citra maka pengiriman suatu pesan yang bersifat rahasia akan memiliki tingkat keamanan yang baik karena tidak dapat dideteksi langsung oleh indera penglihatan manusia. Keywords: Kriptografi, Steganogari, RSA, Metode BPCS

2018 ◽  
Vol 4 (1) ◽  
pp. 57
Author(s):  
Yuli Anwar ◽  
Dahlar .

Abstract. One of the advances in information technology that now has changed the outlook and human life, business process and business strategy of an institution is the internet. The internet is a very large networks that connected to computers and serves throughout the world in one centralized network. With the internet we can access data and information anytime and anywhere.    As one provider of high-speed data communications services and the pioneer of the internet network service provider in Indonesia that provides integrated services, as well as one of the pioneer development of internet services that provide extensive services in the building and apply it throughout Indonesia. Indosat ready to seize opportunities for sustainable growth of business spectrum are still sprawling Indonesia.    Therefore, Indosat continues to focus on the development of increased efforts to provide the best service for customers of Indosat. Indosat will continue to develop and expand network coverage and a larger investment that the company will achieve excellence in the field of integrated telecommunications services.    Ranking by region of the IP Providers can be seen by grouping IP Providers, and management over IP Providers prefer to choose providers based on where it orginates as an example for the region of the U.S if it will be preferred providers that come from U.S. providers.With the commencement of the internet network optimization start early in 2008 with the selection of the appropriate IP Upstream Provider criteria, it is up to date according to data obtained from Indosat, seen any significant changes to the cost of purchasing capacity of the IP Upstream.    Based on the data obtained that until Q3 or September 2008, the number of IP Upstream Providers that previously there were 20 to 10 IP Upstream Provider, IP Transit Price total decrease of 11% to the price of IP Transit Price / Mbps there is a decrease of 78%, while from the capacity bandwith an increase of 301% capacity from 2008.


Author(s):  
Aditya Raj ◽  
Tushar Pahwa ◽  
Ashish Jain

CAPTCHAs are employed on websites to differentiate between human users and bot programs that indulge in spamming and other fraudulent activities. With the advent and advancement of sophisticated computer programs to break CAPTCHAs, it has become imperative to continuously evolve the CAPTCHA schemes in order to keep the Internet network and website free of congestion and spam-bots. In light of these developments concerning information security, in this chapter, the authors introduce the novel concept of Scrambled CAPTCHA, which is a combination of OCR-based and Picture CAPTCHAs and exploits an inherent characteristic of human vision and perception. They also introduce Hindi CAPTCHA, developed in Hindi language (Devanagari script). This CAPTCHA will typically address spamming on Indian websites. It also contributes to the digitalization of books written in this script. The authors also discuss the features and security aspects of these schemes in detail, which, to the best their knowledge, had not been implemented earlier.


Cloud computing (CC) is the expertise over which every person is capable of sharing the reserves, amenities, and evidence amongst the individuals as a result of harnessing the internet in link. Subsequently, protection is a key concern on the facts pooled by means of the internet. In CC a numerous security issues prone to occur that includes confidentiality, integrity, authentication and/or thin well-honed edit control (TWHEC). In this research an innovative security replica has been aforethought. The design stipulates an approach across which secure communication besides data hiding from unauthorized punters can be got hold of. The security resolved with all categories of CC aspects similar to Platform as a Service (aaS), and Process aaS (PaaS), Software aaS, Storage aaS and Security aaS (SaaS), Network aaS (NaaS), Functions aaS (FaaS), Infrastructure aaS, Information aaS, and Integration aaS (IaaS), Database aaS (DBaaS), Application as a Service aaS and API aaS (AaaS), Management aaS (MaaS), Testing aaS (TaaS), etc., This anticipated system yield thin well-honed, mutable and ascendable statistics editing control by means of the manipulation of complex traits of Hierarchical (Ranked/Ordered) attribute-set-based encryption (HASBE). This multifarious qualities of blend of HASBE and Rivest–Shamir–Adleman (RSA) algorithm too. For instance, cyber individual healthiness record (IHR) aids sick persons to deal with his/her personal medicinal archives into a unified means that is to a great extent vital in storing, editing and partaking of the individual healthiness data. Further down encryption, it is impeding in accomplishing the TWHEC to CIHR data in an ascendable and effectual technique by using HASBE. Prevailing RSA encryption does not endow the data with high security in health. To fulfill ascendable, elastic, and thin well-honed edit control of subcontracted statistics in cloud. In this archetypal instigated a mish-mash RSA encryption with HASBE. Cyber IHR dispenses with patients to get along medical archives in a secure way, in which very significant concerns are the storing, access and distribution of individual wellness information. This composite process is responsible for three mode precautions, i.e. data precautions, certification and corroboration. In this report, the HASBE encryption algorithm has been put forward in realizing TWHEC to IHR data in an ascendable and effectual way


2020 ◽  
Vol 1 (2) ◽  
pp. 19-35
Author(s):  
Abdul Muthalib ◽  
Aisyah Aisyah ◽  
Endang Sukari ◽  
Rafika Aulia

The development of the Covid-19 outbreak has indeed had a major impact on all sides of human life, including in the world of education. The world of education seems to make the house an educational institution that can replace formal educational institutions. Learning using the internet network or so-called brave learning (online). Brave learning may be new to some teachers, but maybe some already consider it familiar. The purpose of this study was to find out about the Variety of Alternative Psychomotor-based PAI Learning Media During Covid-19 at MA Preparation 4 Medan.The results obtained from this research are learning that can be done in any condition, but of course the results will not be optimal learning that is done face-to-face in the classroom. To optimize it, of course many are done by teachers. Especially in the PAI subject, several innovations have been made to optimize learning outcomes, namely: 1) Innovations such as presenting learning with multimedia, 2) Online-based discussions and assignments. Teaching also has obstacles in its application, especially in the MA preparatory 4-field country, some of these obstacles: 1) Signal interference that cannot be avoided. 2) Lack of parental and teacher cooperation in managing courageous learning. 3) Limited costs make students reluctant to take bold lessons.


2016 ◽  
Vol 2 (1) ◽  
pp. 1-11 ◽  
Author(s):  
May Htet ◽  
Su Wai Phyo

In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its capacity depends on the similarity of characters of the words in cover text. In addition, as further improvement for security, secret message encryption is performed using Blowfish algorithm before hiding into the innocuous cover text. 


Author(s):  
I. Maria Vincy ◽  
S. S. Dhenakaran

A lot of information is shared across the internet in day-by-day activities, which leads someone or hackers to access other personnel's secure information. In these cases, encryption is a well-known solution for ensuring internet data confidentiality and privacy. In order to make it impossible for someone to decode the information, encryption hides original information in an unintelligible form of information. This paper proposed a refined cryptographic algorithm to secure confidentiality information. The resultant of the proposed encryption algorithm generates a single character, which may be an alphabet or number, or special character. The key size required may be the size of the input information.


2021 ◽  
Vol 6 (2) ◽  
pp. 142
Author(s):  
Pendi Ventri Hendika ◽  
M Suyanto ◽  
Emha Taufiq Luthfi

Teknologi internet of things menawarkan berbagai kemudahan bagi manuasia merupakan terobosan baru yang sangat bermafaat untuk kehidupan. Kesibukan pekerjaan yang begitu padat seringkali memaksa untuk banyak meninggalkan rumah dalam keadaan kosong. Tidak jarang rumah yang ditinggalkan dalam keadaan kosong menjadi sasaran pencuri ataupun bahaya kebakaran. Kasus kebakaran saat yang terjadi saat ini sebagian besar dipicu akibat kebocoran gas konsleting listrik dan pemilik rumah lupa mematikan alat listrik saat meninggalkan rumah. Tetapi masyarakat juga masih ragu jika sistem digital mengalami kendala yang harus dilakukan. Sebagai solusi dari keadaan tersebut maka diperlukan alat yang bisa mengontrol rumah dari jarak jauh menggunakan jaringan internet. Hal ini diharapkan dapat mencegah terjadinya hal yang tidak diinginkan. Untuk mewujudkannya, penulis melakukan riset untuk membangun sebuah sistem rumah pintar yang nantinya semua peralatan listrik dan elektronik dapat dikontrol menggunakan smartphone menggunakan jaringan internet yang menggunakan fungsi switch analog digital. Tujuan lainnya adalah membuat sebuah produk smart home yang cocok di aplikasikan di Indonesia yang nantinya smart home tersebut tidak meniggalkan saklar konvensional yang sudah terpasang dirumah. Penelitian ini berhasil merancang sebuah sistem rumah pintar yang dapat di bypass menjadi sistem listrik analog. Hal ini untuk mengantisipasi ketika terjadi error pada sistem digital sehingga kelistrikan rumah masih dapat berjalan seperti biasa. Kata Kunci— rumah pintar, pengontrol listrik, analog, digital.AbstractInternet technology about things that offer various conveniences for people today is a new breakthrough that is very useful for human life. The bustle of work is so crowded while waiting to go home. There is no damaged house there. Very important for homeowners. The current fire cases are mostly triggered by a gas leak and the homeowner forgets to turn off the electricity when leaving the house. However, the public is still in doubt if a digital system is being done which must be done. As a solution to this situation, we need a tool that can control the house remotely using the internet network. This is expected to be avoided. Unwanted things. To realize this, the authors conducted research to build a smart home system that allows all electrical and electronic equipment to be controlled using a smartphone that uses the internet network provided by a digital analog switch. Not only that, smart home makers that are suitable to be applied in Indonesia while smart homes do not leave conventional diversions installed at home. This research successfully completed a smart home system that can cut bypass into an analog electrical system. This is to correct errors that occur in digital systems so that electricity can still run as usual. Keywords—Smart home, electric controller, analog, digital.


2020 ◽  
Author(s):  
Ashis Acharya ◽  
Nabaraj Poudyal ◽  
Ganesh Lamichhane ◽  
Babita Aryal ◽  
Bibek Raj Bhattarai ◽  
...  

The COVID-19 global pandemic has affected all aspects of human life, with education, not an exception. In an attempt to stop the SARS-CoV-2 spreading like wildfire, the Government of Nepal has implemented nationwide lockdowns since March 24, 2020, that have enforced schools and universities to shut down. As a consequence, more than four hundred thousand students of various levels in higher education institutions (HEIs) are in a dilemma about restoring the situation. Several HEIs, nationwide, have leaped forward from the traditional concept of learning—limited within the boundary of the classroom—to choosing digital platforms as an alternative means of teaching because of the pandemic. For this research, the descriptive and inferential analysis was carried out to investigate the effects and challenges of learning via digital platforms during this pandemic. Data were collected from students and faculty at various levels of higher education and analyzed statistically with different factors using t-test and ANOVA, and variables were found to be approximately normally distributed. The study revealed that 70% of the respondents had access to the Internet, but 36% of the Internet accessed did not continue online classes due to unexpected disturbance in Internet and electrical connectivity. Likewise, 65% of students did not feel comfortable with online classes, and among attendees of online classes, 78% of students want to meet the instructor for a better understanding of course matters. According to the analytic hierarchy process (AHP) model, three factors, such as institutional policy, internet access, and poverty, are found to be significant factors affecting the online higher education systems in Nepal. On the brighter side, this outbreak has brought ample opportunities to reform the conventional teaching-learning paradigm in Nepal.


2017 ◽  
Vol 3 (2) ◽  
pp. 76
Author(s):  
Octarina Nur Samijayani ◽  
Ibnu Fauzi

<p><em>Abstrak</em> - <strong>Keamanan rumah menjadi hal yang sangat penting ketika pemilik rumah meninggalkan rumah dalam keadaan kosong. Selain pencurian, kebakaran juga merupakan masalah yang sering kali terjadi ketika rumah ditinggal pemiliknya. Sebagai alternatif solusi untuk menjaga dan mengawasi rumah yang diajukan pada penelitian ini ialah menggunakan teknologi Jaringan Sensor Nirkabel yang terintegrasi dengan jaringan internet, sehingga pemilik rumah tetap dapat mengawasi keadaan rumah dari jarak jauh. Pada penelitian ini dirancang prototype sistem rumah pintar atau Smart Home yang memanfaatkan teknologi Jaringan Sensor Nirkabel menggunakan standard Zigbee. Beberapa node sensor ditempatkan pada peralatan rumah, dimana setiap node dapat saling berkomunikasi secara wireless dan terpusat di node kordinator. Selanjutnya node kordinatior akan terhubung ke jaringan internet sehingga pemilik rumah dapat membuka aplikasi smart home kapan saja dan dimana saja. Rancangan sistem <em>Smart Home</em> disimulasikan menggunakan rumah model untuk menguji kinerja perangkat <em>Smart Home</em>. Pengujian kinerja Smart Home dimulai dengan pengujian keakurasian masing masing data sensor hingga waktu respon komunikasi dari sensor ke pusat monitoring. Tingkat error pembacaan suhu disetiap ruangan ialah 1 - 4.27%. Sensor PIR berhasil mendeteksi keberadaan orang di suatu ruangan dengan waktu delay </strong><strong>adalah 2.8 detik dengan jarak maksimal 5 meter</strong><strong>. Fungsi kendali dan monitoring (<em>on/off</em>) perangkat elektronik bekerja dengan baik, dengan waktu respon kurang dari 1 detik. Dari hasil pengujian komunikasi nirkabel antar node, diperoleh bahwa jarak maksimal antar node ialah sekitar 20 m, dengan rata-rata waktu respon pengiriman data ialah 1-2 detik. Adapun waktu respon mengalami delay mencapai 2 detik apabila beberapa perintah kendali dilakukan pada waktu yang bersamaan.</strong></p><p> </p><p><strong><em>Kata Kunci - </em></strong><em>Smart Home</em>, Jaringan Sensor Nirkabel, Zigbee.</p><p> </p><p><em>Abstrak</em><strong> - Home security becomes very important when homeowners leave the house empty. In addition to theft, fire is also a problem that often occurs when the house left the owner. As an alternative solution to maintain and supervise the homes submitted in this study is to use Wireless Sensor Network technology integrated with the Internet network, so that homeowners can still monitor the state of the house remotely. In this study designed prototype smart home system or Smart Home which utilizes Wireless Sensor Network technology using Zigbee standard. Some sensor nodes are placed in the home equipment, where each node can communicate wirelessly and centrally at the coordinator node. Next node coordinate will be connected to the internet network so that homeowners can open smart home application anytime and anywhere. The Smart Home system design is simulated using a home model to test the performance of Smart Home devices. Smart Home performance testing begins with testing the accuracy of each sensor data until the communication response time from the sensor to the monitoring center. The error rate of temperature readings in each room is 1 - 4.27%. PIR sensor successfully detects the presence of people in a room with a delay time is 2.8 seconds with a maximum distance of 5 meters. The control and monitoring functions (on / off) of electronic devices work well, with a response time of less than 1 second. From the results of testing wireless communication between nodes, obtained that the maximum distance between nodes is about 20 m, with the average response time of data transmission is 1-2 seconds. The response time has a delay of 2 seconds if some control commands are done at the same time.</strong><strong></strong></p><p><strong> </strong></p><p><strong><em>Keywords - </em></strong> <em>Smart Home</em>, Jaringan Sensor Nirkabel, Zigbee.</p>


Sign in / Sign up

Export Citation Format

Share Document