IMPLEMENTASI ALGORITMA BLOK CIPHER 3 DAN RSA DALAM MENGENKRIPSI DATA HAK CIPTA YANG DISISIPKAN PADA AUDIO MP3 MENGGUNAKAN METODE LEAST SIGNIFICANT BIT

Ariswara ., Rizky Rachman Judhie, Muhamad Nursalman

Abstract


Penyalahgunaan data hak cipta syringe terjadi pada era digital sekarang, dimana informasi sangat mudah sehingga untuk memanipulasi informasi sangat mudah juga, terutama karena data hak cipta pada media yang sering dipakai seperti lagu. Oleh karena itu dibutuhkan sebuah perangkat lunak atau alat yang dapat menyimpan data hak cipta, salah satunya adalah perangkat lunak yang memiliki fungsi dalam mengenkripsi data hak cipta menggunakan metode kriptografi. Pada penelitian metode yang dipakai dalam mengenkripsi data hak cipta adalah metode kriptografi RSA dan BC3, dimana RSA merupakan metode kriptografi asimetris yang menghasilkan dua kunci berbeda yatu kunci publik dan privat, pada metode ini data hak cipta di proses menggunakan dua buah bilangan prima, Sedangkan BC3 merupakan metode kripografi simetris yang menghasilkan kunci privat saja, dengan menggunakan dua buah metode kriptografi maka data hak cipta memiliki keamanan ganda sehingga dapat menjamin kemanan data hak cipta, setelah dienkripsi data hak cipta akan lebih aman dan mudah di akses data hak cipta di input kedalam media yang memiliki data hak cipta tersebut, maka dari itu metode LSB sangat memudahkan untuk fungsi tersebut, dimana metode LSB akan menyisipkan data hak cipta kedalam media. Hasil pengujian enkripsi dan dekripsi data hak cipta lagu menggunakan metode BC3 dan RSA menunjukan bahwa data sangat sensitif terhadap perubahan, sehingga menjamin kerahaisaan data, begitupun data hak cipta dapat diekstrak dari Stegano File yang berupa file audio menggunakan metode LSB.


Keywords


RSA , BC3 , LSB , kriptografi

Full Text:

PDF

References


A.B. Utama, "Pemanfaatan Teknologi Informasi di Kalangan Mahasiswa Universitas Negeri," Jurnal Universitas Airlangga Surabaya , p. 1, 2016.

S.H. E. C. Vidyasagar M. Potdar, "A Survey of Digital Image Watermarking Techniques," in 2005 3rd IEEE International Conference on Industrial Informatics, Perth, 2005.

F.Petitcolas, R. Anderson and M. Kuhn, "Information hiding-a survey," PROCEEDINGS OF THE IEEE, pp. 1062 - 1078, 1999.

Y.Wang, J. Doherty and R. V. Dyck, "A wavelet-based watermarking algorithm for ownership verification of digital images," IEEE Transactions on Image Processing, pp. 77-88, 2002.

T.O'Regan, "From piracy to sovereignty: International video cassette," Continuum: Journal of Media & Cultural Studies, pp. 112-135, 1991.

J.Ullman, "The Development and Testing of Potential Music," UNLV Theses, Dissertations, Professional Papers, and Capstones, pp. 1-314, 2017.

M.C. a. M. Commission, Internet Users Survey 2018, Cyberjaya: Malaysian Communications and Multimedia Commission, 2018.

C.R. S. Enrique Bigne, "THE IMPACT OF INTERNET USER SHOPPING PATTERNS AND DEMOGRAPHICS ON CONSUMER MOBILE BUYING BEHAVIOUR," Journal of Electronic Commerce Research, pp. 193-209, 2005.

R.D. G. a. G. L. S. Sudip Bhattacharjee, "DIGITAL MUSIC AND ONLINE SHARING: SOFTWARE PIRACY 2.0?," COMMUNICATIONS OF THE ACM, pp. 107-111, 2003.

J.P. Q. v. d. E. Y. H. Joost Poort, Global Online Piracy Study, Amsterdam: Institute for Information Law, 2018.

K.B. Kennedy, "Copyright Infringement in Sound Recording: How Courts and Legislatures Can Get in Vogue in a Post-Ciccone World," Journal of Law and Policy, pp. 723-755, 2017.

N.Anwar, "Hidden Message Steganography Design with Matlab-based Least," Jurnal Algoritma, Logika dan Komputasi, vol. 1, no. 1, p. 25, 2018.

K.B. M. L. C. Mandy Douglas, "An overview of steganography techniques applied," Journal Multimed Tools Application, vol. 13, no. 77, p. 17334, 2017.

D.B. K. B.-h. K. Ratul Chowdhury, "A View on LSB Based Audio Steganography," International Journal of Security and Its Applications, vol. 10, no. 2, p. 52, 2016.

B.A. A. M. H. Fatiha Djebbar, "Comparative study of digital audio," Journal on Audio, Speech, and Music Processing, p. 1, 2012.

Q.D. Hai Cheng, "Overview of the Block Cipher," International Conference on Instrumentation & Measurement, Computer, Communication and Control, p. 1628, 2012.

H.K. S. Arif Sasongko, "Architecture for the Secret-Key BC3 Cryptography," ITB Journal of ICT Research and Applications , vol. 5, no. 2, pp. 125-140, 2011.

P.Chaudhury, S. Dhang, M. Roy, S. Deb, J. Saha, A. Mallik, S. Bal, S. Roy, M. K. Sarkar, S. Kumar and R. Das, "ACAFP: Asymmetric Key based Cryptographic Algorithm using Four Prime Numbers to Secure Message Communication A review on RSA algorithm," in 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), Bangkok, 2017.

Y.Liu, W. Gong and W. Fan, "Application of AES and RSA Hybrid Algorithm in E-mail," in 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS), Singapore, 2018.

W.F. S. S. F. A. F. C. Fausto Meneses, "RSA Encryption Algorithm Optimization to Improve," International Journal of Computer Science and Network Security, vol. 16, no. 8, pp. 55-62, 2016.

W.Rui, C. Ju and D. Guangwen, "A k-RSA algorithm," in 2011 IEEE 3rd International Conference on Communication Software and Networks, Xi'an, 2011.

J.-C. L. a. C.-C. L. Chu-Hsing Lin, "Speeding Up RSA Encryption Using GPU Parallelization," in 2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation, Taichung, 2014.

R.K. Sarika Khatarkar, "A Survey and Performance Analysis of Various RSA," International Journal of Computer Applications, vol. 114, no. 7, pp. 30-33, 2015.

J.Denegri-Knott, "MP3," Journal Consumption Markets & Culture, vol. 18, no. 5, pp. 397-401, 2015.

R.R. J. F. S. Muhamad Nursalman, "Implementation of Low Bit Coding Algorithm and Cipher Block with Electronic Code Book Mode for Data Legality in Audio Steganographic Streaming," in 2018 International Conference on Information Technology Systems and Innovation (ICITSI), Padang, 2018.

E.S. A. P. E. Apriyani, "IMPLEMENTASI ALGORITMA KRIPTOGRAFI RC4 DAN METODE STEGANOGRAFI AUDIO 2LSB PADA SISTEM KEAMANAN INFORMASI," Jurnal Teknologi Informatika dan Terapan , pp. 81-88, 2017.

Prabhudesai KevalKetan, V. V. (2012). An Amalgam Approach using AES and RC4 Algorithms for Encryption and Decryption. International Journal of Computer Applications, 29-36.

Akinyele A Okedola, Y. N. (2015). RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text File. International Journal of Scientific & Engineering Research, 289-294.

Viswanathan, P. (2002, Maret 02). Eclipse vs Netbeans vs Intellij IDEA. Diambil dari Lifewire: https://ww.lifeware.com/cimparing-java-ides-eclipse-vs-intellij-2373152




DOI: https://doi.org/10.17509/jatikom.v4i2.27867

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Jurnal Aplikasi dan Teori Ilmu Komputer



JATIKOM is published by Universitas Pendidikan Indonesia
Jl. Dr. Setiabudhi 229 Bandung 40154, West Java, Indonesia
Website: http://www.upi.edu