Desimeri Laoli, Bosker Sinaga, Anita Sindar Sinaga
{"title":"Penerapan Algoritma Hill Cipher Dan Least Significant Bit (LSB) Untuk Pengamanan Pesan Pada Citra Digital","authors":"Desimeri Laoli, Bosker Sinaga, Anita Sindar Sinaga","doi":"10.14421/JISKA.2020.%X","DOIUrl":null,"url":null,"abstract":"Nowadays people exchange information in digital media such as text, audio, video and imagery. The development of Information and Communication makes the delivery of information and data more efficient. Current developments in technology which are very significant have an impact on the community in exchanging information and communicating. Confidential hidden data can also be in the form of image, audio, text, or video. The Hill Chiper algorithm uses a matrix of size m x m as a key for encryption and decryption. One way to recover the original text is of course to guess the decryption key, so the process of guessing the decryption key must be difficult. break ciphertext into palintext without knowing which key to use. The LSB part that is converted to the value of the message to be inserted. After affixing a secret message, each pixel is rebuilt into a whole image that resembles the original image media. The Hill Cipher algorithm is used to determine the position of the plaintext encryption into a random ciphertext. 2. Testing text messages using the hill cipher algorithm successfully carried out in accordance with the flow or the steps so as to produce a ciphertext in the form of randomization of the letters of the alphabet.   ","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"JISKA Jurnal Informatika Sunan Kalijaga","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14421/JISKA.2020.%X","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

如今,人们通过文本、音频、视频和图像等数字媒体交换信息。信息和通信的发展提高了信息和数据的传递效率。目前技术的发展非常重要,对社区交流信息和沟通产生了影响。机密隐藏数据也可以是图像、音频、文本或视频的形式。Hill Chiper算法使用大小为m x m的矩阵作为加密和解密的密钥。恢复原始文本的一种方法当然是猜测解密密钥,因此猜测解密密钥的过程一定很困难。在不知道使用哪一个密钥的情况下,将密文分解为复文。转换为要插入的消息值的LSB部分。在附加一条秘密消息后,每个像素都被重建成一个类似于原始图像媒体的完整图像。Hill密码算法用于确定明文加密到随机密文中的位置。2.使用根据流程或步骤成功执行的希尔密码算法测试文本消息,以便产生字母表中字母随机化形式的密文。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Penerapan Algoritma Hill Cipher Dan Least Significant Bit (LSB) Untuk Pengamanan Pesan Pada Citra Digital
Nowadays people exchange information in digital media such as text, audio, video and imagery. The development of Information and Communication makes the delivery of information and data more efficient. Current developments in technology which are very significant have an impact on the community in exchanging information and communicating. Confidential hidden data can also be in the form of image, audio, text, or video. The Hill Chiper algorithm uses a matrix of size m x m as a key for encryption and decryption. One way to recover the original text is of course to guess the decryption key, so the process of guessing the decryption key must be difficult. break ciphertext into palintext without knowing which key to use. The LSB part that is converted to the value of the message to be inserted. After affixing a secret message, each pixel is rebuilt into a whole image that resembles the original image media. The Hill Cipher algorithm is used to determine the position of the plaintext encryption into a random ciphertext. 2. Testing text messages using the hill cipher algorithm successfully carried out in accordance with the flow or the steps so as to produce a ciphertext in the form of randomization of the letters of the alphabet.   
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
21
审稿时长
12 weeks
期刊最新文献
Pemodelan Proses Bisnis Kuliah Online MOOCs menggunakan BPMN (Studi Kasus alison.com) Analisis Bibliometrik Publikasi Isu Kebocoran Data Menggunakan VOSviewer Klasifikasi Sentimen Masyarakat Terhadap Proses Pemindahan Ibu Kota Negara (IKN) Indonesia pada Media Sosial Twitter Menggunakan Metode Naïve Bayes Klasifikasi Tingkat Kerusakan Sektor Pasca Bencana Alam Menggunakan Metode MULTIMOORA Berbasis Web Pembuatan Ergonomic Mechanical Keyboard untuk Mengurangi Cidera Tangan Menggunakan Teknologi Arduino
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1