IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI
Abstract
Providing security and confidentiality to information is needed when exchanging information through communication networks. It is intended that the information sent by the sender can be received in full by the recipient without any interference from parties who are not interested in the information.
Cryptographic techniques and steganography can be used to secure confidential messages. Building applications that combine these two techniques can provide security for confidential messages well. Security techniques that can be used are cryptographic techniques using the RC4 algorithm to secure secret messages in the form of text or images, and insert secret messages with 2LSB steganography method into audio media.
The analysis carried out is the level of success of the message insertion and extraction process, process speed, stego audio attack, and audio quality. The results of 18 times insertion testing and message extraction, obtained a success percentage of 100% with different processing times depending on the size of the message being inserted. The resulting Stego audio has good quality and does not cause noise that can be heard directly by the human senses, but stego audio cannot withstand attacks that cause changes to the stego file byte value. So it can be concluded that the combination of the RC4 cryptographic algorithm and the 2LSB steganography method can secure the message properly and provide the results of decryption without any changes to the inserted message
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to Jurnal Teknologi Informasi dan Terapan (J-TIT) and Department of Information Technology, Politeknik Negeri Jember as publisher of the journal. Copyright encompasses rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms, and any other similar reproductions, as well as translations. Authors should sign a copyright transfer agreement when they have approved the final proofs sent by Jurnal Teknologi Informasi dan Terapan (J-TIT) prior to the publication. The copyright transfer agreement can be download here .
Jurnal Teknologi Informasi dan Terapan (J-TIT) and Department of Information Technology, Politeknik Negeri Jember and the Editors make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in Jurnal Teknologi Informasi dan Terapan (J-TIT) are the sole responsibility of their respective authors and advertisers.
Users of this website will be licensed to use materials from this website following the Creative Commons Attribution 4.0 International License. No fees charged. Please use the materials accordingly.
This work is licensed under a Creative Commons Attribution-Share A like 4.0 International License
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.