scholarly journals IMPLEMENTASI ALGORITMA STEGANOGRAFI FIRST OF FILE DAN END OF FILE UNTUK PENYISIPAN TEXT DALAM GAMBAR

2020 ◽  
Vol 1 (2) ◽  
pp. 93-104
Author(s):  
Shabila Fitri Aulia ◽  
Siti Sauda

Technological advances have developed rapidly nowadays. These technological advances are also in line with the development of ways of communicating both orally and in writing. In terms of writing, maintaining aspects of data security and confidentiality is very important. Many technologies can be used to secure data such as cryptography and steganography. This research will use the First of File and End of File Steganography Algorithms to secure data. Steganography is the science of hiding messages or data in the media. The First of File and End of File methods are one of the many methods commonly used in the Steganography Algorithm. Generally, the First of File and End of File methods are not much different. The First of File method inserts a message at the beginning of the file, while End Of File inserts a message at the end of the file. This technology can also be applied again for the years to come. This research produces an overview after a review study of the application of the FOF and EOF steganographic algorithms, the speed of steganography and the differences in the image after steganography in terms of image size and pixel. Kemajuan teknologi sudah sangat berkembang dengan pesat pada era sekarang. Kemajuan teknologi ini juga seiring dengan berkembangnya cara berkomunikasi baik secara lisan maupun tulisan. Dalam hal tulisan, menjaga aspek keamanan dan kerahasiaan data sangatlah penting. Banyak teknologi yang bisa dipakai untuk mengamankan data seperti kriptografi dan steganografi. Penelitian ini akan menggunakan Algoritma Steganografi First Of File dan End Of File untuk mengamankan data. Steganografi merupakan ilmu menyembunyikan pesan atau data ke dalam media. Metode First Of File dan End Of File merupakan salah satu dari banyaknya metode yang biasa digunakan pada Algoritma Steganografi.Umumnya,metodeFirst Of File dan End Of File tidak jauh berbeda. Metode First Of File akan menyisipkan pesan diawal file sedangkan End Of File akan menyisipkan pesan di akhir file. Teknologi ini juga dapat diaplikasikan kembali untuk tahun-tahun kedepannya. Penelitian ini menghasilkan gambaran setalah studi review penerapan algoritma steganografi FOF dan EOF , kecepatan steganografi dan juga perbedaan gambar setelah di steganografi dalam hal ukuran dan pixel gambar.

Author(s):  
Musthofa Galih Pradana ◽  
Pujo Hari Saputro ◽  
Bondan Wahyu Pamekas

<br /><em>Cryptography is widely used to secure data and information so that it is not easily misused by parties who are not interested in the data. One type of cryptographic algorithm is Caesar Cipher and Vigenere Cipher. Both of these algorithms are classic cryptographic algorithms that need to be modified so that they become more optimal in the data security process. The first modification is to modify the Vigenere key using Fibonacci. In general, Vigenere Cipher will repeat the same keyword to complete the number of characters that are lacking so that the number of characters is the same as the number of characters in the plaintext. The second modification is to change or convert plaintext letters into ASCII letters so that the code is more difficult to solve. After the ASCII conversion process is done, the next results will be converted back in Hexa letters. In addition to the two modifications made, the steganography technique is also added by hiding the code behind the media in the form of images. Images that are sampled will be renamed and stored in different places.</em>


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan ◽  
Virdyra Tasril

The development of computer and telecommunications technology has experienced the significant change inprogress. It can be seen that technology has become a necessity because technological advances can accomplishtasks quickly, accurately, and efficiently. In line with the development of these technologies, it increasinglychanges the way people communicate. There needs to be security protection to protect data from the threat ofwild parties. Cryptography is the right method to secure data. One method that can be used is the AdvancedEncryption Standard (AES). This method is an excellent classical cryptographic algorithm that can be used toidentify data. AES algorithm is a symmetric ciphertext block that can encrypt and decrypt information quickly.Encryption changes data that can no longer be read called ciphertext; instead, decryption is changing theciphertext data into the original form that we know as plaintext. The AES algorithm has several key modelssuch as 128, 192, and 256 bits to encrypt and decrypt data on 128-bit message blocks. This study uses a 128-bitkey. AES encryption results can be trusted as one of the fast and powerful encryption methods.


Author(s):  
Eric L. Sprankle ◽  
Christian M. End ◽  
Miranda N. Bretz

Utilizing a 2 (lyrics: present or absent) × 2 (images: present or absent) design, this study examined the unique effects of sexually degrading music videos and music lyrics on males’ aggressive behavior toward women, as well as males’ endorsement of rape myths and sexual stereotypes. Under the guise of a media memory study, 187 male undergraduate students were randomly assigned to one of four conditions. Despite the many psychological theories predicting an effect, the presentation of sexually degrading content in a visual or auditory medium (or combination thereof) did not significantly alter the participants’ aggression and self-reported endorsement of rape myths and sexual stereotypes. The null findings challenge the many corporate and governmental restrictions placed on sexual content in the media over concern for harmful effects.


Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


Author(s):  
Alexandra Makarova

The religious communication is the most ancient of human communication types. The pragmatic linguistics as well as rhetoric shows a special attitude to this special type of discourse. Today the Internet text with its unlimited abilities is being in the focus of linguists’ attention. That is why the orthodox journalists are covering not only print media but also the Internet that helps to widen the sphere of influence on the people’s minds and souls. The analyses show that the media context of the Orthodox sites (such as The Orthodox people laugh and etc.) includes humorous publications that prove the necessity of studying peculiarities of religious communication and humorous texts in orthodox sites. The integrative approach including content analyses, discourse and linguistic cultural methods helps the author to come to a conclusion that orthodox media texts are distinguished by intertextuality, hypertextuality, creolism, and the authors want to influence the addressee in the most effective way. To define the communicative task, the missionary function should be taken into account which is peculiar to the religious discourse.


Author(s):  
Joan M. Gilmour

AbstractIn Moore v. Regents of the University of California, the Supreme Court of California held that the human source of blood and tissue used by his physician and other defendants in potentially lucrative medical research without his permission could not assert a legal claim that, in doing so, the defendants had deprived him of any property right in these materials or the cell line developed from them. He was, however, permitted to proceed with his claim that there had been a failure to obtain his informed consent to the excision or removal of these materials, given that their end uses were not disclosed. The decision in Moore is but one example of the range of new legal problems created by the many and rapid advances in biotechnology, and of the attempts courts are making to respond. The judgment raises questions about whether these types of issues as between the patient and medical, research, and pharmaceutical concerns can or ought to be analyzed in terms of property rights. Are the general justifications for recognizing proprietary rights that have traditionally been influential in judicial decisions useful or helpful in this context? And what of the identity of the decision-maker? In Moore, the majority was content to effectively delegate much of the decision-making authority to the U.S. Patent Office and the Office of Technology Assessment. While there are no Canadian decisions directly on point as yet, the pace of technological advances, the potential for economic gain, and the international nature of biotechnology enterprises all set the scene for these issues' coming before our courts in the near future. This paper begins to explore the implications of adopting an analytical model based on property rights and to address the fact that the biotechnology industry already operates on the premise that such material can be owned. It concludes that the current legal regime needs to be modified to allow effective control of these new realities and suggests principles that might be adopted to address important concerns that are raised by the transformation of human tissue and cells into economic goods.


2012 ◽  
Vol 11 (2) ◽  
pp. 169-184 ◽  
Author(s):  
Luis Pérez-González

While the growing ubiquitousness of translation and interpreting has established these activities more firmly in the public consciousness, the extent of the translators’ and interpreters’ contribution to the continued functioning of cosmopolitan and participatory postmodern societies remains largely misunderstood. This paper argues that the theorisation of translation and interpretation as social phenomena and of translators/interpreters as agents contributing to the stability or subversion of social structures through their capacity to re-define the context in which they mediate constitutes a recent development in the evolution of the discipline. The consequentiality of the mediators’ agency, one of the most significant insights to come out of this new body of research, is particularly evident in situations of social, political and cultural confrontation. It is contended that this conceptualisation of agency opens up the possibility of translation being used not only to resolve conflict and tension, but also to promote them. Through a variety of theoretical and methodological approaches, the contributing authors to this special issue explore a number of sites of linguistic and cultural mediation across a range of institutional settings and textual/interactional genres, with particular emphasis on the contribution of translation and interpreting to the genealogy of conflict. The papers presented here address a number of overlapping themes, including the dialectics of governmental policy-making and translation, the interface between translation, politics and the media, the impact of the narrative affiliation of translators and interpreters as agents of mediation, the frictional dynamics of interpreter-mediated institutional encounters and the dynamics of identity negotiation.


2021 ◽  
Vol 2 (8) ◽  
pp. 29-36
Author(s):  
Alexis Dubon ◽  

How do you find common ground with those that believe in a vast, intricate, media conspiracy to hide the truth? In this work of philosophical short story of fiction, the narrator drives out to his parent’s house to visit them for the holidays. Much to his surprise, when his parents open the door, they are only two feet tall! He is concerned that his parents, like many in the world, have shrunk to half their size. His parents, however, are equally concerned about their son because they believe he, and others in the world, have doubled in size. The son tries to explain to his parents that they have shrunk, that is why their house, and all their belongings, seem so large. However, his parents believe he, like many others, have an altered idea of what reality is, and that they have been lied to by the media and local officials. The son continues to come year after year to visit his tiny parents, who continue to refuse that they have changed, not the world around them.


PEDIATRICS ◽  
1963 ◽  
Vol 32 (4) ◽  
pp. 737-741
Author(s):  
D. B. Dill

THE STUDY of work performance as related to age began in this country when Sid Robinson joined the group at the Fatigue Laboratory of the Harvard School of Business Administration. In the winter of 1936-7, he persuaded five champion milers who were in Boston for indoor meets to run on the Laboratory's treadmill on week-ends. Simultaneously, he was chiefly engaged in studying treadmill performance as related to age. This was the subject of his doctorate thesis published later under the title: "Experimental Studies of Physical Fitness as Related to Age". The 91 subjects ranged in age from boys 6 years of age to one man of 91. There were eight 6-year-olds, 10 between 8 and 13 and 20 between 48 and 76. Robinson's background as an Olympic middle-distance runner and as an assistant track coach at Indiana University gave him skill in dealing with the many diverse problems that confronted him. Often he was faced with sociological-psychological problems more difficult to solve than the physiological problems. Indicative of his success is the fact that the subjects were volunteers—no money was offered as an inducement to come to the laboratory. Also worthy of note is that there was no untoward incident throughout the study. Robinson's plan included respiratory, circulatory and metabolic observations in the basal state and in two grades of exercise. He describes the work experiments as follows: (pp. 251-3, reference 2) "After the above observations were completed, the subject performed two grades of work on a motor-driven treadmill, set at an angle of 8.6% in all experiments. Each subject below 73 years of age first walked at 5.6 km per hour for 15 minutes; this raises the oxygen consumption 7 or 8 times the basal level. After resting 10 minutes, he ran or in some cases, walked, at a rate which exhausted him in 2 to 5 minutes.


Sign in / Sign up

Export Citation Format

Share Document