Claim Missing Document
Check
Articles

Found 2 Documents
Search

Correlation of Ambiguity of Steganography with Cryptography in Text-Based Data Security R. Fanry Siahaan; Endra A.P. Marpaung; Gunung Juanda Tampubolon; Ayu Pelita Lumban Siantar
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i2.138

Abstract

The development of information technology began with advances in the field of computerization. The early use of computers to simply write, create graphics and images and store incredible data has been transformed into a communication tool with a soft network that can cover the entire world. With the advancement of technology, the process of interaction between humans can reach the layers of society in the back of any world becomes increasingly open. Along with the advancement of technology all the information needed can be obtained easily, not least information that is confidential or top secret. Because with the help of technology all confidential information is locked or stored properly even though it can be opened and accessed by irresponsible parties. The most popular methods today are steganography and cryptography. Steganography is where confidential data is hidden or pasted in other data such as images, text, audio, or video so as not to cause suspicion of others or steganalyst. Unlike the cryptographic method, where secret data messages are scrambled or encoded so that they cannot be understood by others. And this raises suspicions from the other party or often called cryptanalyst. Based on the results or outputs of a text-based steganography (stegoteks) process against a message, text steganography in Indonesian patterns can evoke a correlation of ambiguity with cryptography in avoiding disclosure of confidential messages with a 100% accuracy rate.
Correlation of Ambiguity of Steganography with Cryptography in Text-Based Data Security R. Fanry Siahaan; Endra A.P. Marpaung; Gunung Juanda Tampubolon; Ayu Pelita Lumban Siantar
IJISTECH (International Journal of Information System and Technology) Vol 5, No 2 (2021): August
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1077.127 KB) | DOI: 10.30645/ijistech.v5i2.138

Abstract

The development of information technology began with advances in the field of computerization. The early use of computers to simply write, create graphics and images and store incredible data has been transformed into a communication tool with a soft network that can cover the entire world. With the advancement of technology, the process of interaction between humans can reach the layers of society in the back of any world becomes increasingly open. Along with the advancement of technology all the information needed can be obtained easily, not least information that is confidential or top secret. Because with the help of technology all confidential information is locked or stored properly even though it can be opened and accessed by irresponsible parties. The most popular methods today are steganography and cryptography. Steganography is where confidential data is hidden or pasted in other data such as images, text, audio, or video so as not to cause suspicion of others or steganalyst. Unlike the cryptographic method, where secret data messages are scrambled or encoded so that they cannot be understood by others. And this raises suspicions from the other party or often called cryptanalyst. Based on the results or outputs of a text-based steganography (stegoteks) process against a message, text steganography in Indonesian patterns can evoke a correlation of ambiguity with cryptography in avoiding disclosure of confidential messages with a 100% accuracy rate.