Repository Universitas Pakuan

Detail Karya Ilmiah Dosen

Robbi Rahim, Danadyaksa Adyaraka, Sulfikar Sallu, Eri Sarimanah, Muhammad Mihram Rahman, Nuke L. Chusna, Sitti Hartinah, Endang Kusuma Astuti, Nuning Kurniasih

Judul : Tiny encryption algorithm and pixel value differencing for enhancement security message
Abstrak :

A combination of algorithms to improve text security is possible, Tiny Encryption Algorithm and Pixel Value Differencing are two possible combinations of algorithms. Cryptography and steganography processes can be done to secure messages with two stages, encryption for the first stage and the second one for steganography. Using this two-stage make it difficult for irresponsible parties to know information.

 

Tahun : 2018 Media Publikasi : Jurnal Internasional
Kategori : Jurnal No/Vol/Tahun : 2.9 / 7 / 2018
ISSN/ISBN : -
PTN/S : Universitas Pakuan Program Studi : PENDIDIKAN BAHASA DAN SASTRA INDONESIA
Bibliography :

[1] A. Putera, U. Siahaan, and R. Rahim, “Dynamic Key Matrix of Hill
Cipher Using Genetic Algorithm,” Int. J. Secur. It is Appl., vol. 10,
no. 8, pp. 173–180, Aug. 2016.
[2] R. Rahim, “128 Bit Hash of Variable Length in Short Message Service
Security,”

Int. J. Secur. It is Appl., vol. 11, no. 1, pp. 45–58,
Jan. 2017.
[3] R. Rahim, M. Dahria, M. Syahril, and B. Anwar, “Combination of
the Blowfish and Lempel-Ziv-Welch algorithms for text compression,”

World Trans. Eng. Technol. Educ., vol. 15, no. 3, pp. 292–
297, 2017.
[4] H. Hartono, D. Abdullah, and A. S. Ahmar, “A New Diversity
Technique for Imbalance Learning Ensembles,” Int. J. Eng. Technol.,
vol.
7,
no.
2,
pp.
478–483,
Apr.
2018.
[5] D. Abdullah, Tulus, S. Suwilo, S. Effendi, and Hartono, “DEA Optimization

with Neural Network in Benchmarking Process,” IOP
Conf. Ser. Mater. Sci. Eng., vol. 288, no. 1, p. 012041, Jan. 2018.
[6] R. Rahim et al., “Combination Base64 Algorithm and EOF Technique
for
Steganography,”
J.
Phys.
Conf.
Ser.,

vol. 1007, no. 1, p.
012003, Apr. 2018.
[7] R. Rahim, “Man-in-the-middle-attack prevention using interlock
protocol method,” ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp.
6483–6487, 2017.
[8] M. Attaran and I. VanLaar, “Privacy and security on the Internet:
how to secure your personal information and company data,” Inf.
Manag. Comput. Secur. vol. 7, no. 5, pp. 241–247, 1999.
[9] K. J. Fitzgerald, “Security and data integrity for LANs and WANs,”
Inf. Manag. Comput. Secur. vol. 3, no. 4, pp. 27–33, 1995.
[10] E. Kartikadarma, T. Listyorini, and R. Rahim, “An Android mobile
RC4 simulation for education,” World Trans. Eng. Technol. Educ.,
vol. 16, no. 1, pp. 75–79, 2018.
[11] H. Nurdiyanto, R. Rahim, and N. Wulan, “Symmetric Stream Cipher
using
Triple
Transposition
Key
Method
and
Base64
Algorithm

for
Security
Improvement,”
J.
Phys.
Conf.
Ser.,
vol.
930,
no.
1,
p.

012005,
Dec.
2017.

[12]

D. Abdullah, R. Rahim, D. Apdilah, S. Efendi, T. Tulus, and S.
Suwilo, “Prime Numbers Comparison using Sieve of Eratosthenes
and Sieve of Sundaram Algorithm,” in Journal of Physics: Conference
Series,
2018,
vol.
978,
no.
1,
p.
012123.

[13]

R. Rahim, H. Winata, I. Zulkarnain, and H. Jaya, “Prime Number:
an Experiment Rabin-Miller and Fast Exponentiation,” J. Phys.
Conf. Ser., vol. 930, no. 1, p. 012032, Dec. 2017.
[14] K. Neeraja, P. Rama Chandra Rao, D. Suman Maloji, and D. Mohammed
Ali
Hussain,
“Implementation
of
security
system
for
bank

using
open
CV
and
RFID,”
Int.
J.
Eng.
Technol.,
vol.
7,
no.
2–7,
p.

187,
Mar.
2018.

[15]

N. Srinivasu, O. Sree Priyanka, M. Prudhvi, and G. Meghana,
“Multilevel classification of security threats in cloud computing,”
Int. J. Eng. Technol., vol. 7, no. 1.5 Special Issue 5, pp. 253–257,
2018.
[16] Y. H. Kim and G. W. Bang, “Development of security camera
combined beacon signal for transmission of disaster and crime situation
as
well
as
tracking
location,”
Int.
J.
Eng.
Technol.,
vol.
7,
no.

2,
pp.
141–144,
2018.

[17]

D. Abdullah et al., “A Slack-Based Measures for Improving the Efficiency
Performance
of
Departments
in
Universitas
Malikussaleh,”

Int.
J.
Eng.
Technol.,
vol.
7,
no.
2,
pp.
491–494,
Apr.
2018.

[18]

A. E. S. Kacaribu and Ratnadewi, “Multiplying cipher images on
visual cryptography with ElGamal algorithm,” in 2015 2nd International
Conference
on
Information
Technology,
Computer,
and
Electrical
Engineering
(ICITACEE),
2015,
pp.
159–162.

[19]

Ratnadewi, R. P. Adhie, Y. Hutama, A. Saleh Ahmar, and M. I. Setiawan,

“Implementation Cryptography Data Encryption Standard
(DES) and Triple Data Encryption Standard (3DES) Method in
Communication System Based Near Field Communication (NFC),”
J. Phys. Conf. Ser., vol. 954, no. 1, p. 012009, Jan. 2018.
[20] L. Legito and R. Rahim, “SMS Encryption Using Word Auto Key
Encryption,” Int. J. Recent Trends Eng. Res., vol. 3, no. 1, pp. 251–
256, 2017.
[21] R. Rahim, D. Hartama, H. Nurdiyanto, A. S. Ahmar, D. Abdullah,
and D. Napitupulu, “Keylogger Application to Monitoring Users
Activity with Exact String Matching Algorithm,” J. Phys. Conf.
Ser., vol. 954, no. 1, p. 012008, 2018.
[22] R. Rahim et al., “Searching Process with Raita Algorithm and its
Application,” J. Phys. Conf. Ser., vol. 1007, no. 1, p. 012004, Apr.
2018.
[23] H. Nurdiyanto and R. Rahim, “Enhanced pixel value differencing
steganography with government standard algorithm,” in 2017 3rd
International Conference on Science in Information Technology
(ICSITech), 2017, pp. 366–371.
[24] R. Bhardwaj and V. Sharma, “Image Steganography Based on
Complemented Message and Inverted Bit LSB Substitution,” in
Procedia Computer Science, 2016, vol. 93, pp. 832–838.
[25] M. Ramalingam and N. A. M. Isa, “A steganography approach over
video images to improve security,” Indian J. Sci. Technol., vol. 8,
no. 1, pp. 79–86, 2015.
[26] H. Zhang, Q. Guan, and X. Zhao, “Steganography based on adaptive
pixel-value
differencing
scheme
revisited,”
in
Lecture
Notes
in

Computer

Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics), 2014, vol. 8389
LNCS, pp. 32–47.
[27] M. Shoeb and V. K. Gupta, “a Crypt Analysis of the Tiny Encryption

Algorithm in Key Generation,” Int. J. Commun. Comput.
Technol., vol. 01, no. 0138, pp. 5–123, 2013.

URL : https://www.sciencepubco.com/index.php/ijet/article/view/13355/5329

 

Document

 
back