Layanan Steganografi dengan Metode End ff File untuk Pengamanan Pesan Elektronik

Authors

  • Faiz Muqorrir Kaffah

DOI:

https://doi.org/10.30999/medinus.v18i0.1287

Abstract

Desktop-based applications are still widely used for users in their daily work. Because computer users who want to secure files and send them to others use the file delivery facility on email, but not all file files can be sent via mail including system files with the format .ade, .adp, .bat, .chm, .cmd, .com , .cpl, .exe, .hta, .ins, .isp, .jar, .jse, .lib, .lnk, .mde, .msc, .msp, .mst, .pif, .scr, .sct, . shb, .sys, .vb, .vbe, .vbs, .vxd, .wsc, .wsf, .wsh. With steganography using the end of file algorithm, the file system insertion is carried out so that it can send system files on sending mail files. Therefore, the end of file algorithm is the choice in helping the optimization of system file insertion. Based on the tests carried out, the application can insert a system file that is blocked by mail to the cover file in the form of an image, without changing the physical appearance of the cover image file or the system file that is inserted, so that system files can be sent via file delivery in mail. Then the election results can be used as a reference and direction to users in sending files to mail in the form of system files without any rejection of blocked files.

References

Frank, J, R James, Mabry John, and Aaron J Ferguson. “Unicode Steganographic Exploitsx.” IEEE Security and Privcy,

: 32-39

D’Orazio, Dante (28 June 2012). “Mail now has 425 million total users”. The Verge. Vox Media. Diakses tanggal 28 June 2012.

Sejati, Adiputra. , 2007, Studi dan Perbandingan Steganografi

Metode EOF(End of File) dengan DCS(Dynamic Cell Spreading), Bandung.

Rakhi and S. Gawande, “A REVIEW ONSTEGANOGRAPHY,” International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 2, no. 10, pp. 4635-4638, 2013.

Wasino, T. P. Rahayu, and Setiawan, “IMPLEMENTASI STEGANOGRAFI TEKNIK END OF FILE DENGAN ENKRIPSI RIJNDAEL,” Seminar Nasional Teknologi Informasi dan Komunikasi 2012 (SENTIKA 2012), pp. 150-157, 2012.

Muslih dan Eko Hari Rachmawanto, “PENGAMANAN FILE MULTIMEDIA DENGAN METODE STEGANOGRAFI END OF FILE UNTUK MENJAGA KERAHASIAAN PESAN”. Techno.COM, Vol. 15, No. 1, Februari 2016

S. Mahajan and A. Singh, “A Review of Methods and Approach for Secure Stegnography,” October, vol. 2, no. 10, pp. 67-70, 2012.

D’Orazio, Dante (28 Juni 2012). “Mail now has 425 million total users”. The Verge. Vox Media. Diakses tanggal 28 June 2012.

Vivan.”Beberapa jenis file tertentu diblokir”. Diakses dari: URL :

https://support.google.com/mail/answer/6590?hl=id.

R. R. Pressman, Rekayasa Perangkat Lunak, Jilid 1. Yogyakarta: ANDI,

Muslih dan Eko Hari Rachmawanto, “PENGAMANAN FILE MULTIMEDIA DENGAN METODE STEGANOGRAFI END OF FILE UNTUK MENJAGA KERAHASIAAN PESAN”. Techno.COM, Vol. 15, No. 1, Februari 2016

Published

2021-11-29

Issue

Section

Artikel