Addition Of Cryptographic Algorithm For Bitmap Image Security Of Medical Record Information System Electronics (Rme)
DOI:
https://doi.org/10.55606/jufdikes.v2i1.380Keywords:
3-5 cryptography, steganography, AES algorithm, LSB method, SHA-1, PSNR.Abstract
In the daily use of technology, humans cannot be separated from the internet as a need to exchange information. People at this time spend more time in front of computer screens, laptops, even smartphones to find out information, send data to some of their friends. One of the information that is often sought or sent is a file. Apart from that, image files are files that are much searched for and sent, and many also contain important information in them. Image file security is of course very important so that unauthorized parties do not hack or manipulate information from the image. There is a way to secure information so that it does not leak to unauthorized parties, namely by using cryptography and steganography. By combining these two methods, you can maintain the confidentiality and security of a file, especially image files. In this study the algorithm and method used is the AES cryptographic algorithm (Advanced Encryption Standard) 256 and the LSB (Least Significant Bit) steganography method. Data integrity needs to be tested to ensure that the encryption and decryption processes are running properly. Data integrity testing uses the SHA-1 method. Likewise, the image quality after insertion will experience a decrease in quality. To evaluate this, it is necessary to test using the PSNR method. From the results of data integrity testing by comparing the hash value of the decrypted image file with the original image file, there is no difference. So this shows that the encryption and decryption process was successful. While in testing using the PSNR method, the average PSNR value is 44.14086 dB and with an average error value of 2.830403 dB, which means there is a small decrease in quality. From the implementation and testing results, it can be concluded that the AES 256 cryptographic algorithm and the steganography method LSB can be implemented in maintaining the confidentiality and security of secret messages.
References
Bhaudhayana, Gede Wisnu, and I. Made Widiartha. 2015. “Implementasi Algoritma Kriptografi AES 256 Dan Metode Steganografi LSB Pada Gambar Bitmap.” Jurnal Ilmu Komputer 8(2):9–25.
Buulolo, Novelius, and Anita Sindar. 2020. “Analisis Dan Perancangan Keamanan Data Teks Menggunakan Algoritma Kriptografi DES (Data Encryption Standard).” Respati 15(3):61. doi: 10.35842/jtir.v15i3.373.
Cahyo Prabowo, Egi, and Irawan Afrianto. 2017. “Penerapan Digital Signature Dan Kriptografi PadaOtentikasi Sertifikat Tanah Digital - Teknik Informatika Universitas Komputer Indonesia.” Jurnal Ilmiah Komputer Dan Informatika (KOMPUTA) 6(2).
Fadlan, Muhammad, Rosmini Rosmini, and Haryansyah Haryansyah. 2021. “Perpaduan Algoritma Kriptografi Atbash Dan Autokey Cipher Dalam Mengamankan Data.” Jurnal Media Informatika Budidarma 5(3):806. doi: 10.30865/mib.v5i3.3019.
Pamungkas, Prima Giri, and Alva Hendi Muhammad. 2022. “Modifikasi Algoritma Kriptografi Caesar Chiper Pada Deretan Simbol Dan Huruf Di Smarphone Dan Laptop.” Journal of Information Technology 2(1):1–5. doi: 10.46229/jifotech.v2i1.234.
Putri, Clarissa Amalia, and Meira Hidayati. 2021. “Analisis Kebutuhan Sumber Daya Manusia Petugas Rekam Medis Dengan Menggunakan Metode Analisis Beban Kerja Kesehatan(Abk-Kes).” Jurnal Manajemen Kesehatan Yayasan RS.Dr. Soetomo 7(2):257. doi: 10.29241/jmk.v7i2.637.
Sijabat, Lambok Hasudungan, Nenna Irsa Syahputri, and Mufida Khairani. 2021. “Kriptografi Dan Steganografi Penyembunyian Pesan Pada Media Audio Menggunakan Algoritma AES.” ALGORITMA: Jurnal Ilmu Komputer Dan Informatika 6341(April):1.
Studi, Program, Teknik Informatika, Fakultas Ilmu, Komputer Universitas, and Dehasen Bengkulu. 2014. “Aplikasi Kriptografi Pesan Menggunakan Algoritma.” 10(2):120–28.
Vivi Wahdini, Sri, Dedy Hartama, and Ika Okta Kirana. 2021. “Pengamanan Data Pelanggan Dan Penjualan Menggunakan Implementasi Algoritma Kriptografi.” Journal of Informatics Management and Information Technology 1(3):101–7.