Implementasi Teknik Steganografi Menggunakan Algoritma Cardan Grille
DOI:
https://doi.org/10.47065/jieee.v2i2.388Keywords:
Implementation; Steganography; Text Hiding; Cardan GrilleAbstract
Data security and confidentiality is an activity that aims to secure data, especially data that is confidential and important. If there is a break-in and theft of information of an important data in a file, it will be detrimental to the parties concerned. Therefore it takes Steganography technique is a technique that can hide messages or confidential information into other messages so that other people are not aware of the existence of the message to be hidden. In this study, the authors build a text data security system using the Cardan Grille Algorithm. whose main function is to hide messages, not to encrypt messages, so Cardan Grille is more often used for steganography. To do Cardan Grille, you need a perforated sheet and in the holes will be filled with letters, which are filled with letters, which are filled with messages and after that the sheet will be lifted and filled with the remaining sentences.
Downloads
References
M. F. Syawal, D. C. Fikriansyah, and N. Agani, “Implementasi Teknik Steganografi Menggunakan Algoritma Vigenere Cipher Dan Metode LSB,” J. TICOM, 2016.
M. Informasi, J. Liu, T. Zhou, Z. Zhang, Y. Ke, and Y. Lei, “Digital Cardan Grille?: Pendekatan Modern untuk,” pp. 1–14.
S. P. Saragih, “Implementasi,” Comput. Based Inf. Syst. J., 2018, doi: 10.33884/cbis.v6i2.707.
Pratiwi, “Sejarah Steganografi,” Perbanas Institute. 2017, [Online]. Available: https://dosen.perbanas.id/sejarah-steganografi/.
D. Darwis, “Teknik Steganografi untuk Penyembunyian Pesan Teks Menggunakan Algoritma GIFSHUFFLE,” J. Teknoinfo, 2017, doi: 10.33365/jti.v11i1.6.
J. Liu, T. Zhou, Z. Zhang, Y. Ke, Y. Lei, and M. Zhang, “Digital cardan grille: A modern approach for information hiding,” 2018, doi: 10.1145/3297156.3297255.
A. Kornain, F. Yansen, and T. Tinaliah, “Penerapan Algoritma Jaro-Winkler Distance Untuk Sistem Pendeteksi Plagiarisme Pada Dokumen Teks Berbahasa Indonesia,” Progr. Stud. Tek. Inform. STMIK GI MDP, 2014.
D. Andika, “Pengertian Flowchart,” It.Jurnal.Com, 2018.
2013 Rosa & Salahuddin, “UML, Use Case Diagram, Activity Diagram, Class Diagram,” in Rekayasa Perangkat Lunak Terstruktur, 2013.
D. L. V. Kiong, “Visual Basic 2010.” p. 1, 2012.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Teknik Steganografi Menggunakan Algoritma Cardan Grille
ARTICLE HISTORY
Issue
Section
Copyright (c) 2022 Sartika Lumbangaol

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


