Analisis Kombinasi Algoritma Steganografi Lsb Dan Visual Kriptografi Terhadap Keamanan Data

55

DAFTAR PUSTAKA

Abboud, G., Marean, J. & Yampolskiy, V. R. 2010. Steganography and Visual
Cryptography in Computer Forensics. International Workshop on Systematic
Approaches to Digital Forensic Engineering 5: 25-32
Begum, M. B. & Venkantaramani, Y. 2012. LSB Based Audio Steganography Based On
Text Compression. Procedia Engineering 30 : 703-710
Boehm, B. 2014. StegExpose A Tool For Detecting LSB Steganography. Tesis. School of
Computing University of Kent.
Chan, C.-K. & Cheng, L. M. 2004. Hiding Data In Images By Simple LSB Substitution.
The Journal Of Pattern Recognition 37: 469-474
Champakamala, B.S. Padmini, K. & Radhika, D. K. 2014. Least Significant Bit algorithm
for image steganography. International Journal of Advance Computer Technology
3(4) : 34-38
Eisen, P. A. & Stinson, D. R. Threshold Visual Cryptography Schemes with Specified
Whiteness Levels of Reconstructed Pixels. 2002. Design, Codes and Cryptography
25:15-61
Fransisco, N. C., Rodrigues, N. M. M., Silva, E. A. B., Carvalho, M. B., Faria, S. M. M.
& Silva, V. M. M. 2010. Scanned Compound Document Encoding Using Multiscale

Recurrent Patterns. IEEE Transactions On Image Processing 19: 2712-2724
Harris, R. 2006. Arriving at an anti-forensics consensus: Examining how to define and
control the anti-forensics problem. Digital Investigation 3: 44-49
Ito, R., Kuwakado, H., & Tanaka, H. 1999. Image size invariant visual cryptography. 10 :
2172-2177
Jain, A. & Chhabra, G. S. 2014. Anti-forensics techniques: An analytical review.
Contemporary Computing (IC3) 7: 412-418
Katzenbeisser, S. Petitcolas, F. A. P. 2000. Information Hiding Techniques for
Steganography and Digital Watermarking. Rtech House Inc: Massachuttes.
Kessler, G. C. 2007. Anti-forensics and the digital investigator. Proceedings of
Australian Digital Forensics Conference 5: 1-7
Liu, F. & Yan, Q. W. 2014. Visual Cryptography for Image Processing and Security
Theory, Methods, and Applications. Springer International Publishing. Switzerland
Luo, X., Liu, B. & Liu, F. 2006. A Dynamic Compensation LSB Steganography Resisting
RS Steganalysis. Proceedings of the IEEE 1: 244-249

Universitas Sumatera Utara

56


Montanaro, D. &Branco, R. R. 2007. The Computer Forensics Challenge and AntiForensics Techniques. Kuala Lumpur Press: Malaysia
Naor, M. & Shamir, A. 1995. Visual cryptography. EUROCRYPT ’94 950: 1-12
Topkara, M., Riccardi, G., Tur, D. H. & Atallah, M. J. 2006. Natural Language
Watermarking: Challenges in Building a Practical System. Proceedings of the SPIE
International Conference on Security, Steganography, and Watermarking of
Multimedia Contents.
Provos, N. & Honeyman, P. 2003. Hide and Seek: An Introduction to Steganography.
IEEE Security & Privacy 1: 32-44
Sutoyo, T., Mulyanto, E., Suhartono, V., Nurhayati, D. N. & Wijayanto. 2009. Teori
Pengolahan Citra. Penerbit Andi : Yogyakarta
Tabriz, P. & Borisov, N. 2006. Breaking the collusion detection mechanism of morphmix.
Lecture Notes in Computer Science 4258: 368–383.
Wayner, P. 2009. Dissappearing Cryptography, Information Hiding: Steganography &
Watermarking Third Edition. Elsevier: USA
Weir, J. & Yan, W. 2012. Visual Cryptography and Its Applications. Ventus Publishing
Aps: New York
Wu, X., Duncan, S., & Li, Q. 2010. Extended Visual Cryptography Scheme for Color
Images With No Pixel Expansion. Security and Cryptography (SECRYPT),
Proceedings of the 2010 International Conference on, Athens. 1 : 1-4
Yusoff, Y., Ismail, R. & Hasan, Z. 2011. Common Phases of Computer Forensics

Investigation Models. International Journal of Computer Science & Information
Technology (IJCSIT) 3: 121-127.
Zang, L., Zhou, Y. & Fan, J. 2014. The forensic analysis of encrypted Truecrypt volumes.
Progress in Informatics and Computing (PIC) 1: 405-409
Yang, C-N. 2004. New visual secret sharing schemes using probabilistic method", Pattern
Recognition Letters. 25 : 481-494

Universitas Sumatera Utara