DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5
Abstract
Keywords
Teks Lengkap:
PDFReferensi
D. R. I. M. Setiadi, E. H. Rachmawanto, and C. Sari, “Secure Image Steganography Algorithm Based on DCT with OTP Encryption,” J. Appl. Intell. Syst., vol. 2, no. 1, pp. 1–11, 2017.
M. Najih, D. R. I. M. Setiadi, C. A. Sari, and S. Astuti, “An Improved Secure Image Hiding Technique Using PN-Sequence Based On DCT-OTP,” in International Conference on Informatics and Computational Sciences (ICICoS), 2017.
C. Mahalle, M. Kulkarni, T. Nangude, and P. G. Navale, “Digital Signature Authentication and Verification on Smart Phones using CR PT Algorithm,” Int. Res. J. Eng. Technol., vol. 4, no. 5, pp. 332–338, 2017.
P. Saha, “A comprehensive study on digital signature for internet security,” Accent. Trans. Inf. Secur., vol. 1, no. 1, pp. 1–6, 2016.
G. Ranjith, B. Prathusha, and P. Sagarika, “Arbitrated Digital Signature for e-Authentication Technique of a Digital Message,” Int. J. Adv. Eng. Technol., vol. 8, no. 5, pp. 753–761, 2015.
V. Kumar and P. K. Koul, “Robust RSA for Digital Signature,” IJCSI Int. J. Comput. Sci. Issues, vol. 8, no. 6, pp. 359–362, 2011.
E. Biham and O. Dunkelman, “A Framework for Iterative Hash Functions-HAIFA.,” IACR Cryptol. ePrint Arch., vol. 1, no. August, pp. 1–20, 2007.
K. Ganeshkumar and D. Arivazhagan, “Generating a digital signature based on new cryptographic scheme for user authentication and security,” Indian J. Sci. Technol., vol. 7, no. Specialissue6, pp. 1–5, 2014.
D. P. Joseph and M. Krishna, “Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 6, no. 3, pp. 51–56, 2015.
S. Singh, M. S. Iqbal, and A. Jaiswal, “Survey on Techniques Developed using Digital Signature : Public key Cryptography,” Int. J. Comput. Appl., vol. 117, no. 16, pp. 1–4, 2015.
R. D. Ardy, O. R. Indriani, C. A. Sari, D. R. Ignatius, and M. Setiadi, “Digital Image Signature using Triple Protection Cryptosystem (RSA, Vigenere, and MD5),” in International Conference on Smart Cities, Automation & Intelligent Computing Systems, 2017, pp. 1–6.
K. Senthil, K. Prasanthi, and R. Rajaram, “A modern avatar of Julius Ceasar and Vigenere cipher,” in 2013 IEEE International Conference on Computational Intelligence and Computing Research, 2013, pp. 1–3.
S. Kromodimoeljo, Teori dan Aplikasi Kriptografi. SPK IT Consulting, 2009.
S. A. Jaju and S. S. Chowhan, “Analytical Study of Modified RSA Algorithms for Digital Signature,” Int. J. Recent Innov. Trends Comput. Commun., vol. 3, no. 3, pp. 944–949, 2015.
D. R. I. M. Setiadi, A. E. Handoyo, E. H. Rachmawanto, C. A. Sari, and A. Susanto, “Teknik Penyembunyian dan Enkripsi Pesan pada Citra Digital dengan Kombinasi Metode LSB dan RSA,” J. Teknol. dan Sist. Komput., vol. 6, no. 1, p. 37, Feb. 2018.
S. Goyal, M. Ramaiya, and D. Dubey, “Improved Detection of 1-2-4 LSB Steganography and RSA Cryptography in Color and Grayscale Images,” in 2015 International Conference on Computational Intelligence and Communication Networks (CICN), 2015, pp. 1120–1124.
DOI: https://doi.org/10.24176/simet.v10i1.2212
Article Metrics
Refbacks
- Saat ini tidak ada refbacks.
Indexed by:
Simetris : Jurnal Teknik Mesin, Elektro dan Ilmu Komputer is licensed under a Creative Commons Attribution 4.0 International License.
Dedicated to: