Implementasi Modified LSB (Least Significant Bit) dan Algoritma DES (Data Encryption Standard) Pada Pengamanan Data Text
67
Daftar Pustaka
Anggraini, Siska.2012.Implementasi Sistem Keamanan Data Menggunakan Algoritma
RSA dan Modified LSB.Skripsi.Universitas Sumatera Utara
Batten, Lynn M.2013.Public Key cryptography Applications and Attacks.IEEE
press.USA
Gabriel,Stephen, Waweru, 2012, An enhanced Least Significant Bit Steganographic
Method for Information Hiding, Journal of Information Engineering and
Applications, Vol 2, No.9:1-11.
Kromodimoeljo, Sentot. 2010. Teori dan Aplikasi Kriptografi. SPK IT Consulting :
Jakarta.
Kipper,Gregory.2004.Invetigator’s Guide To Steganography.A CRC Press
Company.London
Kadir, A. & Susanto A. 2013. Teori dan Aplikasi Pengolahan Citra. Yogyakarta
ANDI: Yogyakarta.
Mollin, Richard a. 2007. An Introduction To Cryptography 2nd. Chapman & Hall :
London
Miano, John. 2004. Compressed image file formats : JPEG, PNG, GIF, XBM, BMP.
Canada: ACM Press
Munir, Rinaldi. 2004. Pengolahan Citra. Bandung Penerbit Informatika
Schneier, Bruce. 1996. Applied Cryptography : Protocols, Algorithms, and Source
Code in C. 2nd Edition. John Wiley & Sons, Inc: New Jersey.
Sadikin, Rifki. 2012. Kriptografi Untuk Keamanan Jaringan. Penerbit ANDI:
Yogyakarta.
Vijayakumar.
Soniya.2011. Image
Steganography
Based
On
Polynomial
Functions. Journal of Global Research in Computer Science.Volume 2 no
3:13-15.
Grabbe,
J.O.2006.The DES algorithm Illustrated.(online).http://page.math.tuberlin.de/~kant/teaching/hess/krypto-ws2006/des.htm.(1 maret 2015)
Universitas Sumatera Utara
Daftar Pustaka
Anggraini, Siska.2012.Implementasi Sistem Keamanan Data Menggunakan Algoritma
RSA dan Modified LSB.Skripsi.Universitas Sumatera Utara
Batten, Lynn M.2013.Public Key cryptography Applications and Attacks.IEEE
press.USA
Gabriel,Stephen, Waweru, 2012, An enhanced Least Significant Bit Steganographic
Method for Information Hiding, Journal of Information Engineering and
Applications, Vol 2, No.9:1-11.
Kromodimoeljo, Sentot. 2010. Teori dan Aplikasi Kriptografi. SPK IT Consulting :
Jakarta.
Kipper,Gregory.2004.Invetigator’s Guide To Steganography.A CRC Press
Company.London
Kadir, A. & Susanto A. 2013. Teori dan Aplikasi Pengolahan Citra. Yogyakarta
ANDI: Yogyakarta.
Mollin, Richard a. 2007. An Introduction To Cryptography 2nd. Chapman & Hall :
London
Miano, John. 2004. Compressed image file formats : JPEG, PNG, GIF, XBM, BMP.
Canada: ACM Press
Munir, Rinaldi. 2004. Pengolahan Citra. Bandung Penerbit Informatika
Schneier, Bruce. 1996. Applied Cryptography : Protocols, Algorithms, and Source
Code in C. 2nd Edition. John Wiley & Sons, Inc: New Jersey.
Sadikin, Rifki. 2012. Kriptografi Untuk Keamanan Jaringan. Penerbit ANDI:
Yogyakarta.
Vijayakumar.
Soniya.2011. Image
Steganography
Based
On
Polynomial
Functions. Journal of Global Research in Computer Science.Volume 2 no
3:13-15.
Grabbe,
J.O.2006.The DES algorithm Illustrated.(online).http://page.math.tuberlin.de/~kant/teaching/hess/krypto-ws2006/des.htm.(1 maret 2015)
Universitas Sumatera Utara