Steganografi untuk Keaslian Tanda Tangan yang Terdigitalisasi Algoritma RC4

Imam Himawan(1*)

(1) Universitas Indraprasta PGRI
(*) Corresponding Author

Abstract


Steganography for digitalized signature authenticity with the RC4 algorithm (Ron's Code # 4). We use this concept where the text is hidden behind the image and the intended recipient is able to see it. The purpose of this research is to maintain the authenticity of the digitalized signature by hiding the message therein. So that if there is a problem regarding a fake or suspicious signature related to the document, it can be resolved properly using this system, the authenticity of the document can be known. This system uses the RC4 Algorithm made with visual basic 6 programming language. In the steganography method this method is very useful if used on computer steganography because there are many digital file formats that can be used as a medium to hide messages. Commonly used formats include: Image format: bitmap, gif, jpeg, etc., Audio format: wav, voc, mp3, etc., The method used is to insert a message and display the message Technique testing the system with RGB (Red Green Blue) . The quality of the software produced is tested based on fourthe quality characteristics of the ISO 9126 model software, namely functionality, reliability , usability , and efficiency. The results of this study will be documentation in the office PT. Jaya For Current that fits the needs of the company

Keywords


Steganography, Encryption, Description for Signature Digitaled by RC4 Algorithm

Full Text:

PDF

References


. Moedjiono. Pedoman Penelitian, Penyusunan dan Penilaian Tesis (v.5). Jakarta: Universitas Budi Luhur. 2012.

http://pascasarjana.budiluhur.ac.id/2012/10/pedoman-tesis-pps-ubl-v5-010112

. Kendall, K.E . Analisis dan Perancangan Sistem. Jakarta: Prehallindo. 2003.

Yusuf Kurniawan. Kriptografi: Keamanan Internet dan Jaringan. 2004.

. B.B.Gite, Divya Choksey, International Journal Of Engineering Research and Aplications. Penerbit www.ijera.com Tahun 2013.

. Jamaludin. Aplikasi Keamanan Informasi Mengunakan Teknik Steganografi dengan Metode Least Significant Bit (LSB) Insertion Dan RC4. Penerbit Universitas Islam Negeri Tahun 2010.

. Hanriyawan A. Mooduto, Albar. Enkripsi Data Menggunakan Algoritma RC4. 2014.




DOI: http://dx.doi.org/10.30998/string.v3i2.3046

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Imam Himawan

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

 

STRING (Satuan Tulisan Riset dan Inovasi Teknologi) indexed by:



Lisensi Creative Commons
Ciptaan disebarluaskan di bawah Lisensi Creative Commons Atribusi 4.0 Internasional.
View My Stats

Flag Counter