1 / 7

STEGANOGRAPHY Sonya Febiatiningsih (11103849)

STEGANOGRAPHY Sonya Febiatiningsih (11103849). for further detail, please visit http://library.gunadarma.ac.id. Abstrak.

halden
Download Presentation

STEGANOGRAPHY Sonya Febiatiningsih (11103849)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. STEGANOGRAPHYSonya Febiatiningsih (11103849) • for further detail, please visit http://library.gunadarma.ac.id

  2. Abstrak • ABSTRACT Sonya Febiatiningsih (11103849) STEGANOGRAPHY IMPLEMENTATION SOFTWARE TO PROTECT INFORMATION SECRECY USING JAVA PROGRAMMING LANGUAGE. Undergraduate Thesis, Information System Department, Faculty of Computer Science and Information Technology, Gunadarma University, 2007 Keywords: Steganography, Information Hiding, JCreator, Java (xvi + 110 + Appendices) Broadband communication networks and multimedia data available in digital formats opened many challenges and opportunities. Nonetheless, the advantages of such an open medium can caused many problems in data security aspect. The commonly occur problem is illegal access into certain information by unauthorized parties. One of the ways to overcome that problem is by applying the practice of steganography. Steganography is the art and... • for further detail, please visit http://library.gunadarma.ac.id

  3. Bab 1 • CHAPTER I INTRODUCTION 1.1. Background of the problem The rapid development of the Internet and the digital information revolution caused significant changes in the global society, ranging from the influence on the world economy to the way people nowadays communicate. Broadband communication networks and multimedia data available in a digital format (images, audio, video) opened many c... • for further detail, please visit http://library.gunadarma.ac.id

  4. Bab 2 • CHAPTER II LITERATURE REVIEW 2.1. General Concepts of Steganography Since the beginnings of human communication, the desire to communicate in secrecy has existed. There have been many solutions to this problem, one of them is, steganography. Many people associated steganography with cryptography, which is not entirely wrong, because both of them share similar purpose to protect certain informat... • for further detail, please visit http://library.gunadarma.ac.id

  5. Bab 3 • CHAPTER III DESIGN AND PROGRAMMING 3.1. General idea of the program SteganoSoft functioned to hide data or information beneath digital objects, or we can say here, digital files. Those objects can be picture files, audio files, and even video files. This application can hide information contained in plain message and digital file. SteganoSoft uses the Least Significant Bits modification method,... • for further detail, please visit http://library.gunadarma.ac.id

  6. Bab 4 • CHAPTER IV EXPERIMENTS AND RESULT ANALYSIS 4.1. Program Experiments After accomplishing the design stage, the next level to obtain is the implementation stage. In the implementation stage, it is essential to perform several experiments to determine the degree of success of the application. In this chapter, four experiments will be performed, which are embedding secret message, retrieving secret... • for further detail, please visit http://library.gunadarma.ac.id

  7. Bab 5 • CHAPTER V CONCLUSION AND SUGGESTION 5.1. Conclusion Nowadays, the practice of steganography has been widely used to secure confidential information from unauthorized use. This study meant to apply the concept of steganography in an application called SteganoSoft. In order to examine the quality and excellence owned by SteganoSoft, several experiments were made; one of them is the experiment of ... • for further detail, please visit http://library.gunadarma.ac.id

More Related