Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : JURIKOM (Jurnal Riset Komputer)

Perancangan Sistem Informasi Pembelajaran (E-Learning) Sekolah Menengah Atas Berbasis Web Ispandi Ispandi
JURIKOM (Jurnal Riset Komputer) Vol 5, No 5 (2018): Oktober 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v5i5.858

Abstract

This e-Learning or computerized learning method provides convenience in the teaching and learning process because it uses internet media, intranet, or other computer networks so that it allows the delivery of subject matter to students. The learning information system that the writer makes covers the provision of learning material that can be read and studied anytime and anywhere, then provides practice questions to train the ability to master the material that has been learned that can be accessed directly whenever and wherever, and provide results direct assessment after the user exercises the questions so that the user is able to measure the extent to which the mastery of the material has been mastered.
Stegnografi Menggunakan Metode Least Significant Bit dan Quick Response Code (QR-Code) Ispandi Ispandi; Ahmad Fauzi; Sugiono Sugiono
JURIKOM (Jurnal Riset Komputer) Vol 6, No 5 (2019): Oktober 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (302.18 KB) | DOI: 10.30865/jurikom.v6i5.1205

Abstract

Transmission of information through the internet can involve sensitive personal data that can be tapped, there are many applications and websites that require good security to avoid the safety of theft of documents and confidential information. Stegnography is the art and science of writing stored secret messages that are not separate from the sending and the recipient is asked related to hidden messages, images as one of the many digital media that can be used as objects to insert messages or secret messages using methods Least Significant Bit (LBS) This method determines data by replacing the bits of data that at least means that it is closed with bits of confidential data. From this meode the author will combine with the Quick Response Code (QR), in order to produce encryption that has higher security, the result of embedding the cover image into a stgno image, will be encrypted again to Quick Response Code (QR).