DETAIL DOCUMENT
Implementasi Algoritma Twofish Dan Hc-128 Pada Proses Steganografi Gambar Dengan Metode F5 Untuk Pengamanan Pesan
Total View This Week0
Institusion
Institut Teknologi Telkom Purwokerto
Author
Indah, Cahyani
Subject
T Technology (General) 
Datestamp
2021-06-09 01:23:09 
Abstract :
The high number of cyber crime crimes can have serious and serious impacts and losses. Therefore, system security is necessary to maintain data security, especially if the data is confidential data. The most suitable technique to be applied in data security is cryptography, this technique is often combined with steganography techniques. In this study, a cryptographic technique was used with two different algorithms, namely the Twofish algorithm and the HC-128 algorithm. The use of the Twofish algorithm is based because it has a flexible and simple design and has no key weaknesses, while the HC-128 algorithm is an algorithm that can generate 128-bit secret keys and 128-bit initialization vectors. In addition, the F5 method is used to apply the steganography technique, where the F5 method is a method that is able to maintain the characteristics of the DCT histogram quite well and is quite superior in terms of capacity. Based on the test results, the message insertion can be done well and the damage caused by the message insertion is not too large because in the Peak Signal to Noise Ratio (PSNR) test, the results obtained are worth 30.20–31.37 dB. Keywords - Data Security, Twofish, HC-128, F5, PSNR. 
Institution Info

Institut Teknologi Telkom Purwokerto