Inserting Message Secret on File Data Bank using Steganography Engineering with EoF (End of File) Method
DOI:
https://doi.org/10.34288/jri.v2i4.121Keywords:
Steganography, End Of File (EOF), Digital Image, Security, Bank, HackerAbstract
Exchanging information does not realize that is important information. Circulates often important information insignificant but such as account bank customer information. The threat of security to information such as interruption, interception, modification, and fabrication. Thefts of information data by irresponsible parties. This research aims to secure information data in the form file digital image to be inserted with a secret message on building application for a secret message security system in the Bank with applying steganography using the End Of File (EOF) method. Steganography application capable of inserting secret messages in digital image data files. The results of the research can keep the existence of the message hidden. When other people receive image files, they can only see the images with the naked eye. So all messages are invisible and will not be read for hackers or other people before knowing the security side and open of password or reading the secret message.
Downloads
References
Anggraini, Y., & Sakti, D. V. S. Y. (2014). Penerapan Steganografi Metode End Of File (EOF) dan Enkripsi Metode Data Encryption Standard (DES) Pada Aplikasi Pengamanan Data Gambar Berbasis Java Programming. Konferensi Nasional Sistem Informasi 2014, 1743.
Anindyawati, N., & Suryani, E. (2012). Pembangunan Aplikasi Penyembunyian Pesan Menggunakan Metode End Of File (EOF) ke dalam Citra Digital Terhadap Pesan yang Terenkripsi Dengan Algoritma RSA. ITSMART, 1(1), 5–12. https://doi.org/https://doi.org/10.20961/itsmart.v1i1.576
Ariyus, D. (2009). Keamanan Multimedia. Andi Publisher.
Guntoro. (2020). Metode Waterfall. Materi Kuliah SI.
Hendini, A. (2016). Pemodelan UML Sistem Informasi Monitoring Penjualan dan Stok Barang (Studi Kasus: Distro Zhezha Pontianak). Jurnal Khatulistiwa Informatika, IV(2), 107–116.
Heriyanto, Y. (2018). Perancangan Sistem Informasi Rental Mobil Berbasis Web Pada PT. Apm Rent Car. Intra-Tech, 2(2), 64–77.
Indriyono, B. V. (2016). Implementasi Sistem Keamanan File dengan Metode Steganografi EOF dan Enkripsi Caesar Cipher. SISFO, 6(1).
Kristanto, A. (2004). Rekayasa Perangkat Lunak (Konsep Dasar). In Gava Media (1st ed.). Gava Media.
Masri, M., Masri, M., Widya, H., & Yuhendri, D. (2019). Perancangan Aplikasi Penyisipan Pesan Pada Pixel Citra Menggunakan Metode End Of File. Journal of Electrical Technology, 4(3), 178–184.
Nasution, Y. R., Johar, A., & Coastera, F. F. (2017). Aplikasi Penyembunyian Multimedia Menggunakan Metode End Of File (EOF) dan Huffman Coding. Jurnal Rekursif, 5(1).
Novita, R., & Sari, N. (2015). Sistem Informasi Penjualan Pupuk Berbasis E-Commerce. TEKNOIF, 3(2).
Nurmaesah, N., Lestari, T., & Retno Mariana, A. (2018). APLIKASI STEGANOGRAFI UNTUK MENYISIPKAN PESAN DALAM MEDIA IMAGE | Nurmaesah | Jurnal TAM (Technology Acceptance Model). Jurnal TAM (Technology Acceptance Model) , 8(1), 13–17. http://ojs.stmikpringsewu.ac.id/index.php/JurnalTam/article/view/82
Sa’adah, N., & Purqon, A. (2016). Perbandingan Hasil Deteksi Tepi Pada Citra Kanker Payudara Dengan Menggunakan Metode Canny Dan Metode Ant Colony Optimization (ACO). Simposium Nasional Inovasi Dan Pembelaran Sains (SNIPS 2016).
Sitorus, M. (2015a). Teknik Steganography Dengan Metode Least Significant Bit (LSB). Jurnal Ilmiah Fakultas Teknik LIMIT’S, 11(2), 54–59. https://doi.org/10.13140/RG.2.2.14942.23362
Sitorus, M. (2015b). Aplikasi Keamanan Data Dengan Teknik Steganografi Menggunakan Metode End Of File (EOF). Proceedings of the 1st Informatics Conference, 1(1). https://doi.org/10.13140/RG.2.2.28364.00643
Suendri. (2018). Implementasi Diagram UML (Unified Modelling Language) Pada Perancangan Sistem Informasi Remunerasi Dosen Dengan Database Oracle (Studi Kasus: UIN Sumatera Utara Medan). ALGORITMA: Jurnal Ilmu Komputer Dan Informatika, 3(1).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Michael Sitorus, Deki Satria

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The Jurnal Riset Informatika has legal rules for accessing digital electronic articles uunder a Creative Commons Attribution-NonCommercial 4.0 International License . Articles published in Jurnal Riset Informatika, provide Open Access, for the purpose of scientific development, research, and libraries.










