Analisis Steganography Terhadap Keamanan Data

Kundang Karsono Juman

Sari


The computer security system includes security data this time able to issue demand. Steganography is the art of concealing the existence of information within seemingly innocuous carriers. Steganography can be viewed as akin to cryptography. Both have been used throughout recorded history as means to protect information. At times these two technologies seem to converge while the objectives of the two differ. Cryptographic techniques "scramble" messages so if intercepted, the messages cannot be understood. Steganography, in an essence. The Implementation steganography in side data security with: Learning to the concept computer security system, to be understand steganography, and to knows in implementation steganography in the data security

Keywords: The Computer Security, Data Security, Steganography Method Data Security and Media


Teks Lengkap:

PDF

Referensi


Curran, Kevin, “An Evaluation of Image Based Steganography Methodsâ€, International Journal of Digital Evidence, Vol 2, Issue 2. 2003.

Dunbar, Bret, “A Detailed Look at Stega-nographic Techniques and Their Use In an Open-Systems Environmentâ€, http:// www.sans.org, Januari 2002, 15 Desember 2006.

Johnson, Neil F., dan Sushil Jajodia, “Steganalysis of Images Created Using Current Steganography Softwareâ€, Artikel Lecture Notes in Computer Science, Vol 1525. April 1998.

Krenn, Robert, “Steganography and Stega-nalysisâ€, Penerbit tidak diketahui, 2004.

Marvel, Lisa M., dkk, “Spread Spectrum Image Steganographyâ€, IEEE Transactions on Image Processing, 8:08, 1999.

Queirolo, Francesco, “Steganography in Ima-gesâ€, Final Communication Report, 2001.

Silman, Joshua, “Steganography and Steganalysis: An Overviewâ€, http:// www.sans.org, Agustus 2001, 5 Desember 2006.

W, Bender, dkk, “Techniques for Data Hi-dingâ€, IBM Systems Journal, Vol 35, NOS 3&4, 1996.

L. M. Marvel, C. G. Boncelet Jr., & C. Retter, “Spread Spectrum Steganographyâ€, IEEE Transactions on Image Processing, 8:08, 1999.




DOI: https://doi.org/10.47007/komp.v6i1.448

Refbacks

  • Saat ini tidak ada refbacks.


VISITOR COUNTER:

gerEGGe

 

Web Analytics Made Easy - Statcounter View My Stats