Research Article
Student Data Value Screen Using Steganography And Cryptography With Eof Method And Design Algorithm Case Study Campus of Universitas Budi Luhur Unit C Salemba
@INPROCEEDINGS{10.4108/eai.20-1-2018.2281912, author={Ady Widjaja}, title={Student Data Value Screen Using Steganography And Cryptography With Eof Method And Design Algorithm Case Study Campus of Universitas Budi Luhur Unit C Salemba}, proceedings={Proceedings of the 1st Workshop on Multidisciplinary and Its Applications Part 1, WMA-01 2018, 19-20 January 2018, Aceh, Indonesia}, publisher={EAI}, proceedings_a={WMA-1}, year={2019}, month={9}, keywords={data security steganography cryptography end of file (eof) data encryption standard (des)}, doi={10.4108/eai.20-1-2018.2281912} }
- Ady Widjaja
Year: 2019
Student Data Value Screen Using Steganography And Cryptography With Eof Method And Design Algorithm Case Study Campus of Universitas Budi Luhur Unit C Salemba
WMA-1
EAI
DOI: 10.4108/eai.20-1-2018.2281912
Abstract
Data on the value of students at the Universitas Budi Luhur Unit C Salemba needs to be secured from irresponsible people. The value data that is in campus salemba after collected per period values will be sent to the central campus in cileduk. The result of cryptography is data that is different from the original form and usually the data seems to be messy so it can not be known what information is contained therein (but actually can be returned to its original form through the description process). Application of EOF Steganography Method System ( End Of File ) aims to provide data security facilities, especially in terms of hiding data intended for companies, businesses and individuals. This research is based on increasing the flow of data packet delivery via email or media others that have a direct impact on increasing threats and data theft. This research was formed by the method of experimental research technique data collection using literature and documentation. Using the incorporation of steganographic and criti- cal techniques on the transfer of confidential information by developing DES algorithms can ensure better confidentiality of threats and data theft . Based on the tests that have been done, the application generated from this research has a good ability, especially in terms of functionality , realiabilit , usability, and effieciency. In general this application has a capability level of 82% or very good.