70 likes | 226 Views
STEGANOGRAPHY Sonya Febiatiningsih (11103849). for further detail, please visit http://library.gunadarma.ac.id. Abstrak.
E N D
STEGANOGRAPHYSonya Febiatiningsih (11103849) • for further detail, please visit http://library.gunadarma.ac.id
Abstrak • ABSTRACT Sonya Febiatiningsih (11103849) STEGANOGRAPHY IMPLEMENTATION SOFTWARE TO PROTECT INFORMATION SECRECY USING JAVA PROGRAMMING LANGUAGE. Undergraduate Thesis, Information System Department, Faculty of Computer Science and Information Technology, Gunadarma University, 2007 Keywords: Steganography, Information Hiding, JCreator, Java (xvi + 110 + Appendices) Broadband communication networks and multimedia data available in digital formats opened many challenges and opportunities. Nonetheless, the advantages of such an open medium can caused many problems in data security aspect. The commonly occur problem is illegal access into certain information by unauthorized parties. One of the ways to overcome that problem is by applying the practice of steganography. Steganography is the art and... • for further detail, please visit http://library.gunadarma.ac.id
Bab 1 • CHAPTER I INTRODUCTION 1.1. Background of the problem The rapid development of the Internet and the digital information revolution caused significant changes in the global society, ranging from the influence on the world economy to the way people nowadays communicate. Broadband communication networks and multimedia data available in a digital format (images, audio, video) opened many c... • for further detail, please visit http://library.gunadarma.ac.id
Bab 2 • CHAPTER II LITERATURE REVIEW 2.1. General Concepts of Steganography Since the beginnings of human communication, the desire to communicate in secrecy has existed. There have been many solutions to this problem, one of them is, steganography. Many people associated steganography with cryptography, which is not entirely wrong, because both of them share similar purpose to protect certain informat... • for further detail, please visit http://library.gunadarma.ac.id
Bab 3 • CHAPTER III DESIGN AND PROGRAMMING 3.1. General idea of the program SteganoSoft functioned to hide data or information beneath digital objects, or we can say here, digital files. Those objects can be picture files, audio files, and even video files. This application can hide information contained in plain message and digital file. SteganoSoft uses the Least Significant Bits modification method,... • for further detail, please visit http://library.gunadarma.ac.id
Bab 4 • CHAPTER IV EXPERIMENTS AND RESULT ANALYSIS 4.1. Program Experiments After accomplishing the design stage, the next level to obtain is the implementation stage. In the implementation stage, it is essential to perform several experiments to determine the degree of success of the application. In this chapter, four experiments will be performed, which are embedding secret message, retrieving secret... • for further detail, please visit http://library.gunadarma.ac.id
Bab 5 • CHAPTER V CONCLUSION AND SUGGESTION 5.1. Conclusion Nowadays, the practice of steganography has been widely used to secure confidential information from unauthorized use. This study meant to apply the concept of steganography in an application called SteganoSoft. In order to examine the quality and excellence owned by SteganoSoft, several experiments were made; one of them is the experiment of ... • for further detail, please visit http://library.gunadarma.ac.id