IMPLEMENTASI METODE BIT MATCHING UNTUK KEAMANAN PESAN TEKS MENGGUNAKAN VISUAL BASIC. NET

Reno Supardi

Abstract


Abstrack - Information and communication technology has developed rapidly, giving a great influence to human life. The development of network and internet technology allows everyone to exchange data, information, or messages to others without limitation of distance and time. Security and confidentiality are important aspects needed in the process of exchanging messages / information. The author uses steganography with the Bit Matching method that will hide information in the form of text into other digital image media. After being analyzed and implemented using the Visual Basic 2010 programming language, it was found that the text that was inserted into the image still looked normal so that it did not raise suspicion for those who saw it. The size of the capacity of a digital image affects how many characters a text message can be hidden. The greater the number of text message characters that will be hidden, the greater the size of the digital image. It is expected that this application of steganography can be useful in the fields of education and science especially in concealing text messages and can be continued for future research.

Keywords - Digital Image, Bit Matching, Visual Basic 2010


Full Text:

PDF

References


Ariyus, D. 2009. Keamanan Multimedia. Yogyakarta: Andi Offset.

Challita, K., & Farhat, H. (2011). Combining Steganography And Cryptography : New Direction. Computer Architectures , 199-208.

Hermawati, F. A. (2013). Pengolahan Cita Digital Konsep dan Teori. Yogyakarta: Andi Offset.

Munir, R. 2006. Kriptografi. Bandung: Informatika.

Purba, J. V., Situmorang, M., & Arisandi, D. (2012). Implementasi Steganografi Pesan Teks Kedalam File Sound (.Wav) Dengan Modifikasi Jarak Pada Algoritma LSB. Teknologi Informasi , I, 1-6.

Putra, D. 2010. Pengolahan Citra Digital, Yogyakarta: Penerbit Andi

Sembiring, S. (2013). Perancangan Aplikasi Steganografi Untuk Menyisipkan Pesan Teks Pada Gambar Dengan Metode End Of File. Teknologi Informatika , 1-7.

Sutarman, 2009. Pengantar Teknologi Informasi, Yogyakarta, Bumi Aksara

Setiawan, 2004. Perancanaan dan Pembangunan Ekonomi, Bandung, Yudistira

Usman, H,P, 2002. Implementasi Perancangan Teknologi, Yogyakarta, Graha Ilmu

Yakub, 2012. Pengantar Sistem Informasi, Yogyakarta, Graha Ilmu.




DOI: https://doi.org/10.36294/jurti.v1i2.293

Refbacks

  • There are currently no refbacks.


Copyright (c) 2017 JurTI (JURNAL TEKNOLOGI INFORMASI)



JurTI (Jurnal Teknologi Informasi) terindex :

 

JurrTI (Jurnal Teknologi Informasi)

Program Studi Program Studi Teknik Informatika, Fakultas Teknik, Universitas Asahan.

Jl. Jend. Ahmad Yani, Kisaran – 21224  – Sumatera Utara

Telp/WA : 082370952109 - 081268777854

E-Mail : jurtischolar@gmail.com

JurTI (Jurnal Teknologi Informasi) s licensed under a Creative Commons Attribution-ShareAlike 4.0 International License