Implementasi Algoritma Redundant Pattern Encoding Untuk Menyisipkan Pesan Teks Ke Dalam Gambar dan Algoritma Fibonacci Codes Untuk Kompresi
Abstract
Information is a collection of data in the form of unified text that is public or confidential. Confidential data is data that contains something or that is not for publication. One way to secure the data is to use Steganography techniques. This provides tremendous benefits for maintaining data confidentiality. In steganography there are several methods, one of which is Redundant Pattern Encoding. However, from this process, the object that will be used as a container to accommodate the data will experience a change in the size of the data. This can raise the suspicion of many parties who want to access the data. This study describes how the procedure is carried out to compress objects that are used as containers to insert messages. The process uses the Fibonacci Codes method which is a simple and very simple data compression method. The results of this research will produce a stronger level of data security.
References
E. N. T. Guruh M Arindra Pratama, “Metode Catalan Number dan Double Columnar,” J. Teknol. Yogyakarta, vol. 4, no. 5, pp. 31–40, 2015.
R. F. Sannawira and A. S. Purnomo, “Penyisipan Citra Pesan Ke Dalam Citra Berwarna Menggunakan Metode Least Significant Bit dan Redundant Pattern Encoding,” vol. 1, no. 1, pp. 39–46, 2016.
K. F. Simbolon, “Perbandingan Kinerja Algoritma Fibonacci Codes Dan Algoritma Reverse Unary Codes Dalam Kompresi Citra,” Jural Ilmu Komput. Dan Inf., vol. 1, 2017.
M. K. Stefanus Yerian Elandha, Magdalena A. Ineke Pakereng, “Perancangan dan Implementasi Steganografi Menggunakan Metode Redundant Pattern Encoding dengan Algoritma AES ( Advanced Encryption Standard ) Artikel Ilmiah Perancangan dan Implementasi Steganografi Menggunakan Metode Redundant Pattern Encoding dengan Alg,” Kumpul. J. TI, vol. 1, no. 1, 2016.
B. Ramdhan, “Implementasi Kombinasi Fibonacci Codes Dan Levenstein Codes Untuk Kompresi File PDF,” INTI, vol. 8, no. 2, pp. 67–71, 2021.
A. H. K. Fresly Nandar Pabokory, Indah Fitri Astuti, “Implementasi Kriptografi pengamanan Data pada Pesan Text Isi File Dokumen Dan FIle Dokumen Menggunakan Algoritma Advanced Encription Standard,” J. Inform. Mulawarman, vol. 10, no. 1, pp. 1–10, 2015.
A. M. Hasibuan, “Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES pada Smartphone,” Media Inf. Anal. dan Sist., vol. 2, no. 1, pp. 29–35, 2017.
A. Suroso, “Implementasi Keamanan Data dengan Algoritma Simetri Rijndael Menggunakan VB.NET 2008,” COMPETITIVE, vol. 11, no. 2, pp. 96–97, 2016.
E. F. Nugraha, I. T. Bandung, and J. G. Bandung, “Meningkatkan Kapasistas Pesan yang disisipkan dengan Metode Redundant Pattern Encoding,” J. Inst. Teknol. Bandung, vol. 1, no. 11, 2011.
D. Putra, Pengolahan Citra Digital. Yogyakarta: ANDI, 2010.
A. Gulo, “IMPLEMENTASI ALGORITMA KRIPTOGAFI RABIN DAN FIBONACCI CODES DALAM PENGAMANAN DAN KOMPRESI FILE CITRA,” J. USU, vol. 1, no. 1, 2018.
Ihsan and D. P. Utomo, “Analisis Perbandingan Algoritma Even-Rodeh Code Dan Algoritma Subexponential Code Untuk Kompresi File Teks,” KOMIK (Konferensi Nas. Teknol. Inf. dan Komputer), vol. 4, no. 1, 2020.
Lamsah and D. P. Utomo, “Penerapan Algoritma Stout Codes Untuk Kompresi Record Pada Databade Di Aplikasi Kumpulan Novel,” KOMIK (Konferensi Nas. Teknol. Inf. dan Komputer), vol. 4, no. 1, 2020.
S. R. Saragih and D. P. Utomo, “Penarapan Algoritma Prefix Code Dalam Kompresi Data Teks,” KOMIK (Konferensi Nas. Teknol. Inf. dan Komputer), vol. 4, no. 1, 2020.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Algoritma Redundant Pattern Encoding Untuk Menyisipkan Pesan Teks Ke Dalam Gambar dan Algoritma Fibonacci Codes Untuk Kompresi
Pages: 43-51
Copyright (c) 2022 Frayogi Aditiya

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).

