LAMPIRAN A: Kode Program

  68 LAMPIRAN A: Kode Program 1.

  proses_teks_tanpa_stemming_executor.php <?php $teks = hapus_spesial_karakter_dan_nomor(strtolower($teks)); function hapus_spesial_karakter_dan_nomor($string){ return preg_replace('/[^A-Za-z]/', ' ', trim($string)); } @$arrayKata = explode(" ", $teks); foreach($arrayKata as $kata){ $kata = hapus_2_karakter($kata); if(trim($kata) != "") { @$teks_kata = $teks_kata . " " . $kata; } } function hapus_2_karakter($kata){ if (strlen($kata) > 2){ return $kata; } else { return ""; } } ?>

  2. proses_teks_dengan_stemming_executor.php

  <?php function hapus_spesial_karakter_dan_nomor($string){ return preg_replace('/[^A-Za-z]/', ' ', trim($string)); } @$arrayKata = explode(" ", $teks); foreach ($arrayKata as $kata) { $kata = hapus_2_karakter($kata); if (trim($kata) != "") { @$teks_kata = $teks_kata . " " . $kata; } } function hapus_2_karakter($kata) { if (strlen($kata) > 2) { return $kata; } else {

  69

  if (mysql_num_rows($q) > 0) { return ""; } else { return $kata; } } ?> 3.

ECS.php

  //Hapus Inflection Suffixes (..-lah, ..-kah, ..-mu, atau ..-nya) function Del_Inflection_Suffixes($kata) { $kataAsal = $kata; if(preg_match('([km]u|nya|[kl]ah|pun)', $kata)){ //Cek Inflection Suffixes $__kata = preg_replace('/([km]u|nya|[kl]ah|pun)$/i', '', $kata); if (preg_match('/([klt]ah|pun)$/i', $kata)){ //Jika berupa partikel (..-lah, ..-kah, ..-tah, atau ..-pun) if (preg_match('/([km]u|nya)$/i', $__kata)){ //Hapus Possesive Pronouns (..-ku, ..-mu, atau ..-nya) $__kata__ = preg_replace('([km]u|nya)$', '', $__kata); return $__kata__; } } return $__kata; } return $kataAsal; }

//Cek Prefix Disallowed Sufixes (Kombinasi Awalan dan Akhiran yang

tidak diizinkan) function Cek_Prefix_Disallowed_Sufixes($kata) { if (preg_match("/^(be)[[:alpha:]]+(i)$/i", $kata)) { //be-.. dan ..-i return true; } if (preg_match("/^(di)[[:alpha:]]+(an)$/i", $kata)){ //di-.. dan ..-an return true; } if (preg_match("/^(ke)[[:alpha:]]+(i|kan)$/i", $kata)){ //ke-.. dan ..-i, ..-kan return true; } if (preg_match("/^(me)[[:alpha:]]+(an)$/i", $kata)){ //me-.. dan ..-an

  70

  return $__kata; } } if (preg_match('/(an|i)$/', $kata)){ //cek ..-kan $__kata__ = preg_replace('/(an|i)$/', '', $kata); if (cekKamus($__kata__)) { //Cek Kamus return $__kata__; } } if (Cek_Prefix_Disallowed_Sufixes($kata)) { return $kataAsal; } return $kataAsal; }

//Hapus Derivation Prefix (di-.., ke-.., se-.., te-.., be-.., me-..,

atau pe-..) function Del_Derivation_Prefix($kata) { $kataAsal = $kata; /* ----- Tentukan Tipe Awalan ----- */ if (preg_match('/^(di|[ks]e)\S{1,}/', $kata)) { //Jika di-.., ke-.., se-.. $__kata = preg_replace('/^(di|[ks]e)/', '', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } } if (preg_match('/^([tmbp]e)\S{1,}/', $kata)){ //Jika awalannya adala te-.., me-.., be-.., atau pe-.. /* ----- Awalan be-.. ----- */ if (preg_match('/^(be)\S{1,}/', $kata)){ //Jika awalan be-.. if(preg_match('/^(ber)[aiueo]\S{1,}/', $kata)) { //Aturan 1 $__kata = preg_replace('/^(ber)/', '', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; }

  71

  $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } $__kata = preg_replace('/^(ter)/', 'r', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } } /* ----- Awalan me-.. ----- */

if (preg_match('/^(me)\S{1,}/', $kata)) { //Jika awalan me-..

if (preg_match('/^(me)[lrwyv][aiueo]/', $kata)) { //Aturan 10 $__kata = preg_replace('/^(me)/', '', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } @$__kata__ = Del_Derivation_Suffixes($__kata__); if (cekKamus($__kata__)) { return $__kata__; } } } /* ----- Awalan memper-.. ----- */ if (preg_match('/^(memper)\S{1,}/', $kata)) { $__kata = preg_replace('/^(memper)/', '', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } /* ----- Cek luluh -r.. ----- */ $__kata = preg_replace('/^(memper)/', '', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__;

  72

  return $kataAsal; } return $kataAsal; } function Enhanced_CS($kata) { $kataAsal = $kata; //1. Cek Kata di kamus, jika ada maka selesai if (cekKamus($kata)) { return $kata; } else {

//2. Buang Infection Suffixes (..-lah, ..-kah, ..-ku, ..-mu, atau

..-nya) $kata = Del_Inflection_Suffixes($kata); //3. Buang Derivation Suffix (..-i atau ..-an) $kata = Del_Derivation_Suffixes($kata); //4. Buang Derivation Prefix $kata = Del_Derivation_Prefix($kata); return $kata; } } ?> 4. winnowing.php

  <?php function winnow($teks, $nilai_gram, $window) { $teks = hapus_special_karakter_dan_nomor($teks); $grams = pembentukan_grams($teks, $nilai_gram); $hash = pembentukan_hash($grams); $array_window = membuat_window($hash, $window); $finger = finger_print($array_window); $finger = array_unique($finger); return $finger; } function similarity($finger1, $finger2) { $finger_sama = 0; foreach ($finger1 as $h1) { foreach ($finger2 as $h2) { if ($h1 == $h2) { $finger_sama++; break; } } } $finger_merge = array_merge($finger1, $finger2);

  73

  $jum = strlen($string); $temp = 0; $kgram_temp = 0; $batas = $kgramAwal - 1; for ($i = 0; $i < $jum - $batas; $i++) { $res[] = substr($string, $i, $kgramAwal); $temp = $kgram; $kgram = $kgram + 1; } return $res; } function pembentukan_hash($grams) { $arrayHash = array(); foreach ($grams as $pos => $gram) { $basis_bilangan = 10; $bilangan_prima = 10007; $charArray = str_split($gram); $pangkat = count($charArray); $hash = 0; foreach ($charArray as $karakter) {

$hash += (ord($karakter)*pow($basis_bilangan,($pangkat-1)));

$pangkat--; } $total_hash = $hash; $hasil = fmod($total_hash, $bilangan_prima); $arrayHash[] = $hasil; } return $arrayHash; } function membuat_window($array, $window) { $arrayWindow = array(); for ($i = 0; $i < count($array) - $window + 1; $i++) { for ($j = $i; $j < $window + $i; $j++) { $arrayWindow[$i][$j] = $array[$j]; } } return $arrayWindow; } function finger_print($array) { $finger = array(); foreach ($array as $obj) { $finger[] = min($obj); } return $finger; }

Pengujian pendeteksian kesamaan dengan proses stemming Jurnal Uji Fingerprint Jurnal Pembanding Fingerprint Fingerprint yang sama Kesamaan (%) Lama Proses (s)

  [677,2100] [2049,7854] [532,873] [866,3285] [2091,4320] [400,1152] [1071,6069] [931,25] [3317,4561] [2384,2531] …

  [550, 1057] [2049, 11683] [2684,1895] [3617, 3172] [532, 5577] [2789, 4367] [2383, 10775] [583, 5133] … 25.34 ± 70.50

  [3458,2] [103,3] [2517,8] [3100,9] [712,10] [754,15] [3921,20] [3074,21] [634,23] [217,27] [318,32] [5284,35] [7783,35] [7072,36] … [906, 6232] [187, 13262]

  Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem [3105,0] [5798,1]

  [187,8] [677,13] [133,15] [550,20] [2049,20] [2684,26] [3617,29] [3140,30] [532,32] [866,37] [2091,38] [2789,40] [4455,41] [4665,42] … Implementasi Sistem

  Analisa PSNR Pada Teknik Steganografi Menggunakan Spread Spectrum [2083, 0] [906,4]

  24.76 ± 63.33

  74 LAMPIRAN B: Hasil Pendekteksian Kesamaan 1.

  Analisa PSNR Pada Teknik Steganografi Menggunakan Spread Spectrum

  Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0

  [2083, 0] [906,4] [187,8] [677,13] [133,15] [550,20] [2049,20] [2684,26] [3617,29] [3140,30] [532,32] [866,37] [2091,38] [2789,40] [4455,41] [4665,42] …

  21.27 ± 84.08 Analisa PSNR Pada Teknik Steganografi Menggunakan Spread Spectrum

  … [187,2187] [677,1931] [133,2643] [583,1394] [2230,3977] [1071,3580] [3978,763] [2384,6123] [401,104] [45,1136] ...

  [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1569,30] [4704,32] [1376,33] [223,37] [175,39] [3860,44] [4131,45] [680,46]

  … Implementasi Steganografi Pesan Text Ke Dalam File Sound (.Wav) Dengan Modifikasi Jarak Byte Pada Algoritma Least Significant Bit (Lsb)

  [2083,0] [906,4] [187,8] [677,13] [133,15] [550,20] [2049,20] [2684,26] [3617,29] [3140,30] [532,32] [866,37] [2091,38] [2789,40] [4455,41] [4665,42]

  [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1647,30] [1154,31] [1752,36] [1540,40] [1144,43] [2311,48] [3832,49] [1330,50] …

  75 Pengujian pendeteksian kesamaan dengan proses stemming (lanjutan) Jurnal Uji Fingerprint Jurnal Pembanding Fingerprint Fingerprint yang sama Kesamaan (%) Lama Proses (s)

  [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1647,30] [1154,31] [1752,36] [1540,40] [1144,43] [2311,48] [3832,49] [1330,50]

  [3458,2] [103,3] [2517,8] [3100,9] [712,10] [754,15] [3921,20] [3074,21] [634,23] [217,27] [318,32] [5284,34] [7783,35] [7072,36] … [446, 3295] [1660,503]

  Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem [3105,0] [5798,1]

  [1660,7] [2349,8] [3234,9] [4009,11] [882,12] [2202,17] [1516,18] [1125,19] [1929,24] [5270,27] [3282,29] [420,30] [3388,35] [3105,36] … Implementasi Sistem

  Implementasi Kriptografi Dan Steganografi [1115,0] [446,2]

  22.40 ± 59.77

  … [1660,7287] [2349,7794] [3234,3791] [4009,2898] [882,2038] [1516,6717] [420,530] [3105,4360] [5790,3720] [2773,3875] …

  Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0

  Implementasi Kriptografi Dan Steganografi

  [1115,0] [446,2] [1660,7] [2349,8] [3234,9] [4009,11] [882,12] [2202,17] [1516,18] [1125,19] [1929,24] [5270,27] [3282,29] [420,30] [3388,35] [3105,36] …

  61.67 Implementasi Kriptografi Dan Steganografi

  … 20.68 ±

  … [1115,1936] [1660,5500] [882,1869] [2202,3814] [3282,3652] [3105,324] [2773,3707] [1646,1619] [2177,7111] [858,842]

  [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1569,30] [4704,32] [1376,33] [223,37] [175,39] [3860,44] [4131,45] [680,46]

  Implementasi Steganografi Pesan Text Ke Dalam File Sound (.Wav) Dengan Modifikasi Jarak Byte Pada Algoritma Least Significant Bit (Lsb)

  [1115,0] [446,2] [1660,7] [2349,8] [3234,9] [4009,11] [882,12] [2202,17] [1516,18] [1125,19] [1929,24] [5270,27] [3282,29] [420,30] [3388,35] [3105,36] …

  [4009, 2303] [882, 544] [2202, 11625] [1125, 5708] [3105, 0] [2773, 7809] [1646, 318] [2177, 1466] … 23.40 ± 64.00

  76 Pengujian pendeteksian kesamaan dengan proses stemming (lanjutan) Jurnal Uji Fingerprint Jurnal Pembanding Fingerprint Fingerprint yang sama Kesamaan (%) Lama Proses (s)

  [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1647,30] [1154,31] [1752,36] [1540,40] [1144,43] [2311,48]

[3832,

  [3105,0] [5798,1] [4405,5681] [3211,11085] [641,12807] [2797,4941] [3514,9348] [4921,12814] [4730,4514] [2400,12816]

  [3105,0] [5798,1] [3458,2] [103,3] [2517,8] [3100,9] [712,10] [754,15] [3921,20] [3074,21] [634,23] [217,27] [318,32] [5284,34] [7783,35] [7072,36] …

  Implementasi Sistem Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem

  [3105,0] [5798,1] [4405,2] [3211,5] [328,9] [5383,14] [1313,15] [630,17] [641,22] [2797,26] [3514,27] [4921,28] [4730,29] [2400,30] [975,31] [1130,36] …

  Implementasi Steganography Menggunakan Metode Least Significant Bit (Lsb) Pada Mobile Phone Berbasis Symbian Os

  25.79 ± 84.37

  49] [1330,50] … [3105, 4360][4405, 477] [3211, 311] [328, 145] [5383, 9402] [1313, 5477] [630, 2942] [641, 1712] [2797, 1717] [3514, 1718] …

  … Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0

  Implementasi Steganography Menggunakan Metode Least Significant Bit (Lsb) Pada Mobile Phone Berbasis Symbian Os

  [3105,0] [5798,1] [4405,2] [3211,5] [328,9] [5383,14] [1313,15] [630,17] [641,22] [2797,26] [3514,27] [4921,28] [4730,29] [2400,30] [975,31] [1130,36]

  Implementasi Steganography Menggunakan Metode Least Significant Bit (Lsb) Pada Mobile Phone Berbasis Symbian Os

  20.83 ± 111.90

  … [3105,324] [5798,1710] [4405,1711] [3211,1714] [328,845] [5383,850] [1313,2975] [630,772] [641,3130] [2797,3133] …

  [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1569,30] [4704,32] [1376,33] [223,37] [175,39] [3860,44] [4131,45] [680,46]

  … Implementasi Steganografi Pesan Text Ke Dalam File Sound (.Wav) Dengan Modifikasi Jarak Byte Pada Algoritma Least Significant Bit (Lsb)

  [3105,0] [5798,1] [4405,2] [3211,5] [328,9] [5383,14] [1313,15] [630,17] [641,22] [2797,26] [3514,27] [4921,28] [4730,29] [2400,30] [975,31] [1130,36]

  … 25.49 ± 68.81

Pengujian pendeteksian kesamaan dengan tanpa proses stemming Jurnal Uji Fingerprint Jurnal Pembanding Fingerprint Fingerprint yang sama Kesamaan (%) Lama Proses (s)

  [2083,8649] [906,8591] [187,1425] [677,3904] [133,9325] [550,12663] [2049,14397] [2684,12996] [532,12370] [866,12750] …

  40.13 ± 47.95

  [187, 4960] [677, 1494] [550, 1595] [2684, 5977] [3617, 5657] [3140, 14386] [532, 20835] [862, 1221] …

  

[3458,2] [103,3]

[2517,8] [4020,9] [6145,12] [6506,13] [4036,14] [688,16] [2009,21] [4657,22] [696,23] [1091,28] [6146,32] [2048,33] … [2083, 19135] [906, 350]

  Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem [3105,0] [5798,1]

  [187,8] [677,13] [133,15] [550,20] [2049,24] [2684,26] [3617,29] [3140,30] [532,32] [866,37] [2091,38] [2789,40] [4455,41] [4665,42] … Implementasi Sistem

  Analisa PSNR Pada Teknik Steganografi Menggunakan Spread Spectrum [2083,0] [906,4]

  39.21 ± 38.11

  77 2.

  Analisa PSNR Pada Teknik Steganografi Menggunakan Spread Spectrum

  Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0

  [2083,0] [906,4] [187,8] [677,13] [133,15] [550,20] [2049,24] [2684,26] [3617,29] [3140,30] [532,32] [866,37] [2091,38] [2789,40] [4455,41] [4665,42] …

  34.13 ± 44.26 Analisa PSNR Pada Teknik Steganografi Menggunakan Spread Spectrum

  [906,9306] [677,2847] [133,232] [550,3885] [3140,7885] [4455,2921] [2118,6556] [400,1552] [583,1183] [302,151] …

  [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1361,30] [612,31] [4006,36] [734,38] [175,43] [3860,48] [4131,49] [680,50] …

  … Implementasi Steganografi Pesan Text Ke Dalam File Sound (.Wav) Dengan Modifikasi Jarak Byte Pada Algoritma Least Significant Bit (Lsb)

  [2083,0] [906,4] [187,8] [677,13] [133,15] [550,20] [2049,24] [2684,26] [3617,29] [3140,30] [532,32] [866,37] [2091,38] [2789,40] [4455,41] [4665,42]

  [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [914,30] [3545,35] [7318,37] [4357,38] [7156,43] [7069,44] [3172,47] [996,50] …

  78 Pengujian pendeteksian kesamaan dengan tanpa proses stemming (lanjutan) Jurnal Uji Fingerprint Jurnal Pembanding Fingerprint Fingerprint yang sama Kesamaan (%) Lama Proses (s)

  [1667,6011] [1503,3331] [337,195] [3234,7469] [882,3839] [2202,1167] [1516,12373] [3105,3534] [5790,16245] [2773,7235]

  [4020, 11567] [4036, 11548] [696, 8252] [1091, 95] [6146, 100] [2048, 101] [1757, 14318] [325, 250] …

  

[3458,2] [103,3]

[2517,8] [4020,9] [6145,12] [6506,13] [4036,14] [688,16] [2009,21] [4657,22] [696,23] [1091,28] [6146,32] [2048,33] … [3105, 41] [103, 13765]

  Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem [3105,0] [5798,1]

  [337,7] [3234,12] [4009,16] [882,17] [2202,22] [1516,24] [1125,29] [1929,32] [5270,34] [3282,35] [3388,40] [3105,41] [5790,46 ] … Implementasi Sistem

  Implementasi Kriptografi Dan Steganografi [1667,0] [1503,2]

  … 34.62 ± 43.48

  [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [914,30] [3545,35] [7318,37] [4357,38] [7156,43] [7069,44] [3172,47] [996,50] …

  Implementasi Kriptografi Dan Steganografi

  Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0

  [1667,0] [1503,2] [337,7] [3234,12] [4009,16] [882,17] [2202,22] [1516,24] [1125,29] [1929,32] [5270,34] [3282,35] [3388,40] [3105,41] [5790,46 ] …

  30.93 ± 43.83 Implementasi Kriptografi Dan Steganografi

  … [1667, 2004] [337,133] [4009,7525] [882,3324] [2202,1244] [1516,5695] [1929,6893] [3282,6456] [3105,654] [5790,657] ...

  [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1361,30] [612,31] [4006,36] [734,38] [175,43] [3860,48] [4131,49] [680,50]

  ] … Implementasi Steganografi Pesan Text Ke Dalam File Sound (.Wav) Dengan Modifikasi Jarak Byte Pada Algoritma Least Significant Bit (Lsb)

  [1667,0] [1503,2] [337,7] [3234,12] [4009,16] [882,17] [2202,22] [1516,24] [1125,29] [1929,32] [5270,34] [3282,35] [3388,40] [3105,41] [5790,46

  35.60 ± 42.59

  79 Pengujian pendeteksian kesamaan dengan tanpa proses stemming (lanjutan) Jurnal Uji Fingerprint Jurnal Pembanding Fingerprint Fingerprint yang sama Kesamaan (%) Lama Proses (s)

  [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [914,30] [3545,35] [7318,37] [4357,38] [7156,43] [7069,44] [3172,47] [996,50] ...

  [3105,0] [5798,1] [3211,18246] [1245,7545] [1687,508] [2037,3230] [641,22178] [2797,8630] [3514,22184] [4921,22185] …

  [3105,0] [5798,1]

[3458,2] [103,3]

[2517,8] [4020,9] [6145,12] [6506,13] [4036,14] [688,16] [2009,21] [4657,22] [696,23] [1091,28] [6146,32] [2048,33] …

  Implementasi Sistem Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem

  [3105,0] [5798,1] [4405,2] [3211,5] [328,9] [5383,14] [1245,15] [1134,19] [1687,24] [2037,29] [2080,31] [641,32] [2797,37] [3514,38] [4921,39] [4730,40] …

  Implementasi Steganography Menggunakan Metode Least Significant Bit (Lsb) Pada Mobile Phone Berbasis Symbian Os

  39.28 ± 51.10

  [3105, 3534] [3211, 1117] [328, 17081] [5383, 17086] [1245, 14338] [1134, 671] [1687, 676] [2037, 681] [2080, 3725] [641, 3339] …

  Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0

  Implementasi Steganography Menggunakan Metode Least Significant Bit (Lsb) Pada Mobile Phone Berbasis Symbian Os

  [3105,0] [5798,1] [4405,2] [3211,5] [328,9] [5383,14] [1245,15] [1134,19] [1687,24] [2037,29] [2080,31] [641,32] [2797,37] [3514,38] [4921,39] [4730,40] …

  Implementasi Steganography Menggunakan Metode Least Significant Bit (Lsb) Pada Mobile Phone Berbasis Symbian Os

  2797,2924] … 34.74 ± 63.60

  … [3105,654] [5798,3150] [4405,3151] [3211,3154] [5383,2598] [1245,4826] [1687,4241] [2037,4246] [641,5461] [

  [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1361,30] [612,31] [4006,36] [734,38] [175,43] [3860,48] [4131,49] [680,50]

  … Implementasi Steganografi Pesan Text Ke Dalam File Sound (.Wav) Dengan Modifikasi Jarak Byte Pada Algoritma Least Significant Bit (Lsb)

  [3105,0] [5798,1] [4405,2] [3211,5] [328,9] [5383,14] [1245,15] [1134,19] [1687,24] [2037,29] [2080,31] [641,32] [2797,37] [3514,38] [4921,39] [4730,40]

  40.22 ± 39.96