Rizka Putri Rahayu
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

IMPLEMENTATION OF THE HAMMING CODE METHOD IN BIT DATA IMPROVEMENT TRANSMISSION PROCESS Achmad Fauzi; Rizka Putri Rahayu
Jurnal Informatika Kaputama (JIK) Vol 5, No 1 (2021): Volume 5, Nomor 1 Januari 2021
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v5i1.455

Abstract

In a communication system, the success of delivering information from the sender (transmitter) to the receiver (receiver) depends on how accurately the receiver can receive the transmitted signal properly and correctly. In fact, there are still a lot of errors received in the information signal so that data is corrupted (bit error) which is caused by noise (nuisance signal) during the data transmission process, causing the file to be unreadable. Therefore, technology is needed to correct the error in the bit error, namely using the Hamming code method. Hamming code is a simple type of linear error correcting code and is widely used in electronic equipment. Hamming code method works by inserting several check bits into the data. The number of check bits to be inserted depends on the length of the data. Hamming code uses Ex-OR (Exclusive OR) operations in the process of detecting and correcting errors.
KEAMANAN CITRA DIGITAL DENGAN MEMANFAATKAN PROSES PENERAPAN ALGORITMA DATA ENCRYPTION STANDART (DES) PADA EKTRAKSI PIXEL Achmad Fauzi M.Kom; Rizka Putri Rahayu
Jurnal Informatika Kaputama (JIK) Vol 4, No 2 (2020): Volume 4, Nomor 2 Juli 2020
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v4i2.319

Abstract

In today's digital technology, almost all activities can be documented in the form of digital images. The problem that arises is that images that are confidential can be stolen and accessed by people who are not entitled. To overcome this security problem, image files can be encrypted using cryptographic algorithms. One cryptographic algorithm that can be used is the Data Encryption Standard (DES) algorithm. This algorithm is a block cipher with a size of 64 bits or 8 bytes. Therefore, DES is used to encrypt image files per 8 bytes. Each encryption process will pass 16 cycles and produce cipher bytes. The result of encryption is an image file with an unrecognized format and cannot be opened because the contents of the byte file have been randomized. To return the scrambled file back to the original image file, perform the decryption process using the same key as the encryption key. The application can be used to encrypt and decrypt images using the DES algorithm. The application can also display the steps of the encryption and decryption process towards the contents of the byte in the file.