• Tidak ada hasil yang ditemukan

Analisis Kombinasi Algoritma Steganografi Lsb Dan Visual Kriptografi Terhadap Keamanan Data

N/A
N/A
Protected

Academic year: 2017

Membagikan "Analisis Kombinasi Algoritma Steganografi Lsb Dan Visual Kriptografi Terhadap Keamanan Data"

Copied!
2
0
0

Teks penuh

(1)

55

DAFTAR PUSTAKA

Abboud, G., Marean, J. & Yampolskiy, V. R. 2010. Steganography and Visual Cryptography in Computer Forensics. International Workshop on Systematic Approaches to Digital Forensic Engineering 5: 25-32

Begum, M. B. & Venkantaramani, Y. 2012. LSB Based Audio Steganography Based On Text Compression. Procedia Engineering 30 : 703-710

Boehm, B. 2014. StegExpose A Tool For Detecting LSB Steganography. Tesis. School of Computing University of Kent.

Chan, C.-K. & Cheng, L. M. 2004. Hiding Data In Images By Simple LSB Substitution.

The Journal Of Pattern Recognition 37: 469-474

Champakamala, B.S. Padmini, K. & Radhika, D. K. 2014. Least Significant Bit algorithm for image steganography. International Journal of Advance Computer Technology 3(4) : 34-38

Eisen, P. A. & Stinson, D. R. Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels. 2002. Design, Codes and Cryptography 25:15-61

Fransisco, N. C., Rodrigues, N. M. M., Silva, E. A. B., Carvalho, M. B., Faria, S. M. M. & Silva, V. M. M. 2010. Scanned Compound Document Encoding Using Multiscale Recurrent Patterns. IEEE Transactions On Image Processing 19: 2712-2724

Harris, R. 2006. Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem. Digital Investigation 3: 44-49

Ito, R., Kuwakado, H., & Tanaka, H. 1999. Image size invariant visual cryptography. 10 : 2172-2177

Jain, A. & Chhabra, G. S. 2014. Anti-forensics techniques: An analytical review.

Contemporary Computing (IC3) 7: 412-418

Katzenbeisser, S. Petitcolas, F. A. P. 2000. Information Hiding Techniques for

Steganography and Digital Watermarking. Rtech House Inc: Massachuttes.

Kessler, G. C. 2007. Anti-forensics and the digital investigator. Proceedings of

Australian Digital Forensics Conference 5: 1-7

Liu, F. & Yan, Q. W. 2014. Visual Cryptography for Image Processing and Security

Theory, Methods, and Applications. Springer International Publishing. Switzerland

Luo, X., Liu, B. & Liu, F. 2006. A Dynamic Compensation LSB Steganography Resisting RS Steganalysis. Proceedings of the IEEE 1: 244-249

(2)

56

Montanaro, D. &Branco, R. R. 2007. The Computer Forensics Challenge and

Anti-Forensics Techniques. Kuala Lumpur Press: Malaysia

Naor, M. & Shamir, A. 1995. Visual cryptography.EUROCRYPT ’94950: 1-12

Topkara, M., Riccardi, G., Tur, D. H. & Atallah, M. J. 2006. Natural Language Watermarking: Challenges in Building a Practical System. Proceedings of the SPIE

International Conference on Security, Steganography, and Watermarking of Multimedia Contents.

Provos, N. & Honeyman, P. 2003. Hide and Seek: An Introduction to Steganography.

IEEE Security & Privacy 1: 32-44

Sutoyo, T., Mulyanto, E., Suhartono, V., Nurhayati, D. N. & Wijayanto. 2009. Teori

Pengolahan Citra. Penerbit Andi : Yogyakarta

Tabriz, P. & Borisov, N. 2006. Breaking the collusion detection mechanism of morphmix.

Lecture Notes in Computer Science 4258: 368383.

Wayner, P. 2009. Dissappearing Cryptography, Information Hiding: Steganography &

Watermarking Third Edition. Elsevier: USA

Weir, J. & Yan, W. 2012. Visual Cryptography and Its Applications. Ventus Publishing Aps: New York

Wu, X., Duncan, S., & Li, Q. 2010. Extended Visual Cryptography Scheme for Color Images With No Pixel Expansion. Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on, Athens. 1 : 1-4

Yusoff, Y., Ismail, R. & Hasan, Z. 2011. Common Phases of Computer Forensics Investigation Models. International Journal of Computer Science & Information

Technology (IJCSIT) 3: 121-127.

Zang, L., Zhou, Y. & Fan, J. 2014. The forensic analysis of encrypted Truecrypt volumes.

Progress in Informatics and Computing (PIC) 1: 405-409

Yang, C-N. 2004. New visual secret sharing schemes using probabilistic method", Pattern Recognition Letters. 25 : 481-494

Referensi

Dokumen terkait

mengikuti pembuktian kualifikasi terhadap dokumen yang saudara ajukan, yang akan dilaksanakan pada :. - Hari

z Untuk menguji Skenario 1dan skenario 2 dilihat dari kelebihan dan g j manfaat yang diberikan oleh skenario ini yaitu dengan membandingkan jumlah antrian kapal yang ada di

Apakah harga wajar saham PT Bank Mandiri, Tbk, PT Bank Rakyat Indonesia, Tbk dan PT Bank Negara Indonesia, Tbk periode 2006-2009 yang dinilai dengan Price Earning Ratio memiliki

Profile Matching menghasilkan nilai ranking berdasarkan selisih nilai pembobotan karyawan dengan kriteria, sedangkan AHP berdasarkan perbandingan nilai hasil iterasi matriks

The very first is that you may not have to bring guide anywhere by satisfying the bag with this Animal Cell Culture And Technology (THE BASICS (Garland Science)) By Michael Butler It

Dengan mengungkap makna al-z}ulm dalam al-Qur'an, ditemukan bahwa pada hakikatnya al-z}ulm bukan hanya terjadi kepada sesama manusia, akan tetapi juga kepada Allah,

Ada 4 Protein lain bagian kecil dari massa otot lurik yaitu tropomiosin yang terdiri dari molekul fibrosa 2 rantai  dan  pada celah aktin-F terdapat disemua otot, troponin

Faktor kemudahterancaman pertanian padi yang dianalisis dalam kajian ini adalah berkaitan dengan persepsi petani terhadap isu perubahan iklim, ekonomi dan sosial.. Model