98
DAFTAR PUSTAKA
Ade, A. 2011. Studi Perbandingan Kinerja Algoritma Kompresi Shannon-Fano Dan Huffman Pada Citra Digital. Skripsi. Medan, Indonesia : Universitas Sumatera Utara.
Ayushi. 2010. A Sysmetric Key Cryptographic Algorithm. International Journal of Computer Aplications. Volume 1-No.14.
Cole, E. 2003. Hiding in Plain Sight: Steganography and Art of Convert Communication. Indianapolis, indiana. Willey Publishing, Inc.
Degraf, G.A., Pellenz, M.D., Santin, A.O., & Maziero, C.A. 2007. A Three Pass Protocol for Cryptography Based on Padding for Wireless Network. Pontificial Catholic University of Parana.
Gellert, W. 1975.The VNR Concise Encyclopedia of Mathematics.Van Nostrand Reinhold Company: New York.
Jasril. Marzuki, I,. Rahmat, F,. 2012. Modificattion Four Bits of Uncomppressed Steganography Using Least Significant Bit (LSB) Method. ICACSIS 2012. 287-292
Klitz, E. dan Pietzak, K. 2010. Leakage Resilient Elgamal Enkription. Journal of centrum Winkunde and Informatica. Nedherland.
Kromodimoeljo, S. 2010. Teori dan Aplikasi Kriptografi. SPK IT Consulting: Jakarta.
M. Dobsicek. 2004, Extended steganographic system, 2004 8th International Student Conference on Electrical Engineering. FEE CTU.
Mollin, R. A. 2002. RSA and Public-Key Cryptography.2nd Edition. Chapman & Hall/CRC: Florida.
Mollin, R. A. 2007. An Introduction to Cryptography.2nd Edition. Chapman & Hall/CRC: Florida.
Munir, R. 2007. Matematika Diskrit. Edisi ke-3. Informatika: Bandung.
Neeta, D, Shehal, K. and Jacobs, D. 2007. Implementation of LSB Steganography and Its Evaluation for Various Bits. Digital Information Management, 2006 1st International Conference. pp 173-178.
99
Pramana, Tengku. S. 2013. Implenemtasi Massey-Omura Cryptosystem dan Lehman Prime Generator untuk Keamanan E-mail Pada Mozilla Thunderbird. Skripsi. Medan: Universitas Sumatera Utara
Prasetyo, E.2011.Pengolahan Citra Digital dan Aplikasinya menggunakan Matlab. Yogyakarta: Andi Offset.
Pusparani, N. A. 2009. Analisa RSA dengan Penambahan Chinese Remainder Theorem untuk mempercepat Proses. Skripsi. Departemen Ilmu Komputer. Institut Pertanian Bogor: Bogor.
Reza, M. 2012. Simulasi Pengamanan File Teks dengan Menggunakan Algoritma Massey-Omura. Skripsi. Medan: Universitas Sumatera Utara.
Schneier, B. 1996.Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd Edition. John Wiley & Sons, Inc: New Jersey.
Sharma, P., Gupta, A.K., dan Sherma, S. 2012. Intesified ElGamal Cryptosystem (IEC). Internatioanal Journal of Advences in Engineering and Technology. ISSN:2331-1963.
Simamora, Hermanda. I. T. 2013. Implementassi Algoritma Elgamal dengan Pembangkit Bilangan Prima Lehman dan Algoritma Least Significant Bit (LSB) dengan Cover Image Bitmap untuk Keamanan Data Text. Skripsi. Medan: Universitas Sumatera Utara.
van Tilborg, H.C.A., & Jajodia, S. 2011. Encyclopedia of Cryptography and Security. Springer: New York
Verma, V., Poonam., & Chawla, R. 2014. An Enchanced Least Significat Bit Steganography Method Using Midpoint Circle Approach. International Conference on Communication and Signal Processing: 105-108.
Winton, R. 2007. Enhancing the Massey-Omura Cryptosystem. Journal of Mathematical Science and Mathematics Education. 21-29
Zwillinger, D. 2003. CRC: Standard Mathematical Tables and Formulae. Chapman & Hall/CRC: New York.