67
Daftar Pustaka
Anggraini, Siska.2012.Implementasi Sistem Keamanan Data Menggunakan Algoritma RSA dan Modified LSB.Skripsi.Universitas Sumatera Utara
Batten, Lynn M.2013.Public Key cryptography Applications and Attacks.IEEE press.USA
Gabriel,Stephen, Waweru, 2012, An enhanced Least Significant Bit Steganographic Method for Information Hiding, Journal of Information Engineering and
Applications, Vol 2, No.9:1-11.
Kromodimoeljo, Sentot. 2010. Teori dan Aplikasi Kriptografi. SPK IT Consulting : Jakarta.
Kipper,Gregory.2004.Invetigator’s Guide To Steganography.A CRC Press Company.London
Kadir, A. & Susanto A. 2013. Teori dan Aplikasi Pengolahan Citra. Yogyakarta ANDI: Yogyakarta.
Mollin, Richard a. 2007. An Introduction To Cryptography 2nd. Chapman & Hall : London
Miano, John. 2004. Compressed image file formats : JPEG, PNG, GIF, XBM, BMP. Canada: ACM Press
Munir, Rinaldi. 2004. Pengolahan Citra. Bandung Penerbit Informatika
Schneier, Bruce. 1996. Applied Cryptography : Protocols, Algorithms, and Source Code in C. 2nd Edition. John Wiley & Sons, Inc: New Jersey.
Sadikin, Rifki. 2012. Kriptografi Untuk Keamanan Jaringan. Penerbit ANDI: Yogyakarta.
Vijayakumar. Soniya.2011. Image Steganography Based On Polynomial Functions. Journal of Global Research in Computer Science.Volume 2 no
3:13-15.
Grabbe, J.O.2006.The DES algorithm Illustrated.(online).http://page.math.tu-berlin.de/~kant/teaching/hess/krypto-ws2006/des.htm.(1 maret 2015)