The rapid development of computer technology triggers crimes that take ad-vantage of weaknesses in computer systems. One form of crime is the act of hack-ers who take data and information through computer security holes. This data is used for various things that are not supposed to. Information sent via communica-tion media can taken and misused by parties who are not responsible. Electronic data security systems have actually been developed. With the emergence of vari-ous data security methods such as encryption and steganography. Encryption is one way of securing data files by means of a random documents, while Steganog-raphy is the protection of electronic data by hiding a file into another file. Based on the feasibility test of the syst...
Cryptography is a method of securing data using algorithms that have been developed continuously unt...
Security is an important aspect of an information system. Many people do not know how to secure file...
Security is an important aspect of an information system. Many people do not know how to secure file...
Seiring dengan meningkatnya kejahatan komputer yang terus berkembang yang dilakukan oleh sebagian or...
In the current era, data security disturbances often occur, such as data theft by unwanted people. T...
In the current era, data security disturbances often occur, such as data theft by unwanted people. T...
Seiring dengan meningkatnya kejahatan komputer yang terus berkembang yang dilakukan oleh sebagian or...
Along with the development of the technological era in the increasingly rapid digital world, the cri...
Abstract : Steganography is the art and science of hiding messages in a message. In the world of mod...
This paper discusses safety data using steganography and cryptography. Advances in information techn...
Along with the development of the technological era in the increasingly rapid digital world, the cri...
As had been widely circulated special program data protection either freeware, shareware, and commer...
With the development of technology, especially in the IT field, the more developed also the current ...
Kemajuan teknologi telah berkembang pesat, khususnya pada pertukaran informasi yang semakin global. ...
Issues of security and confidentiality of data is very important to organization or individual. If t...
Cryptography is a method of securing data using algorithms that have been developed continuously unt...
Security is an important aspect of an information system. Many people do not know how to secure file...
Security is an important aspect of an information system. Many people do not know how to secure file...
Seiring dengan meningkatnya kejahatan komputer yang terus berkembang yang dilakukan oleh sebagian or...
In the current era, data security disturbances often occur, such as data theft by unwanted people. T...
In the current era, data security disturbances often occur, such as data theft by unwanted people. T...
Seiring dengan meningkatnya kejahatan komputer yang terus berkembang yang dilakukan oleh sebagian or...
Along with the development of the technological era in the increasingly rapid digital world, the cri...
Abstract : Steganography is the art and science of hiding messages in a message. In the world of mod...
This paper discusses safety data using steganography and cryptography. Advances in information techn...
Along with the development of the technological era in the increasingly rapid digital world, the cri...
As had been widely circulated special program data protection either freeware, shareware, and commer...
With the development of technology, especially in the IT field, the more developed also the current ...
Kemajuan teknologi telah berkembang pesat, khususnya pada pertukaran informasi yang semakin global. ...
Issues of security and confidentiality of data is very important to organization or individual. If t...
Cryptography is a method of securing data using algorithms that have been developed continuously unt...
Security is an important aspect of an information system. Many people do not know how to secure file...
Security is an important aspect of an information system. Many people do not know how to secure file...