Transaction Document Security Protection In The Form Of Image File, Jpg or Tif Interbank Transfer Using Steganography And Cryptography

Authors

  • Sucipto Basuki STMIK Insan Pembangunan
  • Reksa Anugrah STMIK Insan Pembangunan

DOI:

https://doi.org/10.34306/itsdi.v1i1.12

Keywords:

Steganography, Cryptography, certificates, validity, proof

Abstract

 Information security process can be done by hiding the information on other media or by certain methods, so that other people do not realize there is some information in the media. Technique known as Steganography and Cryptography. Steganography is a technique to hide or disguise the existence of secret messages in the media reservoirs. While Cryptography disguise the meaning of a message, but do not hide that there is a message. In a bank cannot be separated in the presence of inter-bank transactions which transfer if the transfer interbank transactions done in branch offices and nominal transaction exceeds the transaction limit branch offices will require official approval in the upper branch. How do I prove the authenticity of the document transfer transaction? Therefore, a company in the banking sector needs to be a medium to prove the validity of the document sent by the branch transaction. In this case the author has designed an application with a blend of steganography and cryptography techniques that can be used in testing the validity of the transaction document. By using steganographic techniques undercover in a media that has brought and cryptographic key assignment as random, then the document that is sent in the branch office can be proved.

Downloads

Download data is not yet available.

References

1] Aditya, Y., Pratama, A., & Nurlifa, A. (2010). Studi pustaka untuk steganografi dengan beberapa metode. Jurnal Fakultas Hukum UII.
[2] Utomo, T. P. (2012). Steganografi Gambar dengan Metode Least Significant Bit untuk proteksi komunikasi pada media online (Doctoral dissertation, UIN Sunan Gunung Djati Bandung).
[3] Sasongko, J. (2005). Pengamanan Data Informasi menggunakan Kriptografi Klasik. Dinamik, 10(3).
[4] Utami, E. (2009). Pendekatan Metode Least Bit Modification Untuk Merancang Aplikasi Steganography Pada File Audio Digital Tidak Terkompresi. Jurnal Dasi, 10(1).
[5] Westfeld, A. (2006, November). Steganalysis in the presence of weak cryptography and encoding. In International Workshop on Digital Watermarking (pp. 19-34). Springer, Berlin, Heidelberg.

Additional Files

Published

2021-04-01

How to Cite

Basuki, S., & Anugrah, R. (2021). Transaction Document Security Protection In The Form Of Image File, Jpg or Tif Interbank Transfer Using Steganography And Cryptography. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 1(1), 42–48. https://doi.org/10.34306/itsdi.v1i1.12

Issue

Section

Articles