An-nissa, Shahira
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Cryptography Application on RGB Overlapping Block Based PVD Using AES Elhanafi, Andi Marwan; Tommy, Tommy; Siregar, Rosyidah; Yeni, Manovri; An-Nissa, Shahira
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 3 (2022): Article Research Volume 6 Number 3, July 2022
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i3.11685

Abstract

Pixel Value Differencing is a data hiding method in digital images that uses the difference in pixel values as a reference for inserting secret data bits. RGB Overlapping Block Based PVD is an optimization of PVD steganography. RGB Overlapping Block Based PVD provides a much larger capacity with acceptable quality. In this study, the AES cryptography application is used as an additional layer on RGB Overlapping Block Based PVD to provide additional security. Testing and observations have been carried out on the capacity and quality aspects of the embedding results using additional AES encryption. Based on the results, AES cryptography applications can be implemented properly where there is no significant change in terms of capacity and quality to the default RGB Overlapping Block Based PVD.
RC4 GGHN Cryptography Algorithm for Message Security An-nissa, Shahira
InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan Vol 6, No 2 (2022): InfoTekJar Maret
Publisher : Universitas Islam Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30743/infotekjar.v6i2.4531

Abstract

Cryptography is a technique that is generally used in security in the process of exchanging information in the form of text messages, picture messages, or others involving two or more users. There are many types and classifications of cryptography developed to date that are able to provide security for the information sent. Modern cryptography that is popular and widely used is the Rivest Cipher (RC4) algorithm. RC4 cryptography is a type of stream cipher, which processes units or input data at one time. This research will use a combination of several message character lengths, namely 50, 100, 250, 500, 1000, 2500, 5000, 10000 characters, and tested using several key lengths, namely 5, 10, 25, 50, 100 characters. from testing with message length parameters and keys then the results will be compiled into a table and described into an image for easy understanding. Research results show it can be concluded that the length of the key used in encryption does not significantly affect the effectiveness of the system processing time. In addition, the length of the text has a big influence in determining the length of the system process in encrypting and decrypting messages. the more the number of characters that will be sent, the higher the processing time required to perform the security process once using the RC4 GGHN cryptography algorithm