68
LAMPIRAN A: Kode Program
1. proses_teks_tanpa_stemming_executor.php 2){ return $kata; } else { return ""; } } ?>
2. proses_teks_dengan_stemming_executor.php 2) { return $kata; } else { return ""; } } $arrayKata = explode(" ", $teks_kata); foreach ($arrayKata as $kata) { $a = hapus_stop_words(trim($kata)); if ($a != "") { @$hasil_hapus_stop_words = $hasil_hapus_stop_words . " " . $a; } } function hapus_stop_words($kata) { $q=mysql_query("SELECT * FROM tb_stoplist WHERE stoplist='$kata'") or die(mysql_error()); $r = mysql_fetch_array($q);
69 if (mysql_num_rows($q) > 0) { return ""; } else { return $kata; } } ?>
3. ECS.php //Hapus Inflection Suffixes (..-lah, ..-kah, ..-mu, atau ..-nya) function Del_Inflection_Suffixes($kata) { $kataAsal = $kata; if(preg_match('([km]u|nya|[kl]ah|pun)', $kata)){ //Cek Inflection Suffixes $__kata = preg_replace('/([km]u|nya|[kl]ah|pun)$/i', '', $kata); if (preg_match('/([klt]ah|pun)$/i', $kata)){ //Jika berupa partikel (..-lah, ..-kah, ..-tah, atau ..-pun) if (preg_match('/([km]u|nya)$/i', $__kata)){ //Hapus Possesive Pronouns (..-ku, ..-mu, atau ..-nya) $__kata__ = preg_replace('([km]u|nya)$', '', $__kata); return $__kata__; } } return $__kata; } return $kataAsal; } //Cek Prefix Disallowed Sufixes (Kombinasi Awalan dan Akhiran yang tidak diizinkan) function Cek_Prefix_Disallowed_Sufixes($kata) { if (preg_match("/^(be)[[:alpha:]]+(i)$/i", $kata)) { //be-.. dan ..-i return true; } if (preg_match("/^(di)[[:alpha:]]+(an)$/i", $kata)){ //di-.. dan ..-an return true; } if (preg_match("/^(ke)[[:alpha:]]+(i|kan)$/i", $kata)){ //ke-.. dan ..-i, ..-kan return true; } if (preg_match("/^(me)[[:alpha:]]+(an)$/i", $kata)){ //me-.. dan ..-an return true; } if (preg_match("/^(se)[[:alpha:]]+(i|kan)$/i", $kata)){ //se-.. dan ..-i, ..-kan return true; } return false; } //Hapus Derivation Suffixes (..-i, ..-an, atau ..-kan) function Del_Derivation_Suffixes($kata) { $kataAsal = $kata; if (preg_match('/(kan)$/', $kata)){ //Cek Suffixes $__kata = preg_replace('/(kan)$/', '', $kata); if (cekKamus($__kata)) { //Cek Kamus
70 return $__kata; } } if (preg_match('/(an|i)$/', $kata)){ //cek ..-kan $__kata__ = preg_replace('/(an|i)$/', '', $kata); if (cekKamus($__kata__)) { //Cek Kamus return $__kata__; } } if (Cek_Prefix_Disallowed_Sufixes($kata)) { return $kataAsal; } return $kataAsal; } //Hapus Derivation Prefix (di-.., ke-.., se-.., te-.., be-.., me-.., atau pe-..) function Del_Derivation_Prefix($kata) { $kataAsal = $kata; /* ----- Tentukan Tipe Awalan ----- */ if (preg_match('/^(di|[ks]e)\S{1,}/', $kata)) { //Jika di-.., ke-.., se-.. $__kata = preg_replace('/^(di|[ks]e)/', '', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } } if (preg_match('/^([tmbp]e)\S{1,}/', $kata)){ //Jika awalannya adala te-.., me-.., be-.., atau pe-.. /* ----- Awalan be-.. ----- */ if (preg_match('/^(be)\S{1,}/', $kata)){ //Jika awalan be-.. if(preg_match('/^(ber)[aiueo]\S{1,}/', $kata)) { //Aturan 1 $__kata = preg_replace('/^(ber)/', '', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } $__kata = preg_replace('/^(ber)/', 'r', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } } /* ----- Awalan te-.. ----- */ if (preg_match('/^(ter)[aiueo]\S{1,}/', $kata)) { //Aturan 6 $__kata = preg_replace('/^(ter)/', '', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik }
71 $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } $__kata = preg_replace('/^(ter)/', 'r', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } } /* ----- Awalan me-.. ----- */ if (preg_match('/^(me)\S{1,}/', $kata)) { //Jika awalan me-.. if (preg_match('/^(me)[lrwyv][aiueo]/', $kata)) { //Aturan 10 $__kata = preg_replace('/^(me)/', '', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } @$__kata__ = Del_Derivation_Suffixes($__kata__); if (cekKamus($__kata__)) { return $__kata__; } } } /* ----- Awalan memper-.. ----- */ if (preg_match('/^(memper)\S{1,}/', $kata)) { $__kata = preg_replace('/^(memper)/', '', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } /* ----- Cek luluh -r.. ----- */ $__kata = preg_replace('/^(memper)/', '', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } } /* ----- Cek luluh -r.. ----- */ $__kata = preg_replace('/^(mempel)/', 'l', $kata); if (cekKamus($__kata)) { return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } } /* ----- Cek Ada Tidaknya Prefix/Awalan di-.., ke-.., se-.., te.., be-.., me-.., atau pe-.. ----- */ if (preg_match('/^(di|[kstbmp]e)\S{1,}/', $kata) == FALSE) {
72 return $kataAsal; } return $kataAsal; } function Enhanced_CS($kata) { $kataAsal = $kata; //1. Cek Kata di kamus, jika ada maka selesai if (cekKamus($kata)) { return $kata; } else { //2. Buang Infection Suffixes (..-lah, ..-kah, ..-ku, ..-mu, atau ..-nya) $kata = Del_Inflection_Suffixes($kata); //3. Buang Derivation Suffix (..-i atau ..-an) $kata = Del_Derivation_Suffixes($kata); //4. Buang Derivation Prefix $kata = Del_Derivation_Prefix($kata); return $kata; } } ?>
4. winnowing.php
73 $jum = strlen($string); $temp = 0; $kgram_temp = 0; $batas = $kgramAwal - 1; for ($i = 0; $i < $jum - $batas; $i++) { $res[] = substr($string, $i, $kgramAwal); $temp = $kgram; $kgram = $kgram + 1; } return $res; } function pembentukan_hash($grams) { $arrayHash = array(); foreach ($grams as $pos => $gram) { $basis_bilangan = 10; $bilangan_prima = 10007; $charArray = str_split($gram); $pangkat = count($charArray); $hash = 0; foreach ($charArray as $karakter) { $hash += (ord($karakter)*pow($basis_bilangan,($pangkat-1))); $pangkat--; } $total_hash = $hash; $hasil = fmod($total_hash, $bilangan_prima); $arrayHash[] = $hasil; } return $arrayHash; } function membuat_window($array, $window) { $arrayWindow = array(); for ($i = 0; $i < count($array) - $window + 1; $i++) { for ($j = $i; $j < $window + $i; $j++) { $arrayWindow[$i][$j] = $array[$j]; } } return $arrayWindow; } function finger_print($array) { $finger = array(); foreach ($array as $obj) { $finger[] = min($obj); } return $finger; } ?>
LAMPIRAN B: Hasil Pendekteksian Kesamaan
1. Pengujian pendeteksian kesamaan dengan proses stemming Jurnal Uji
Fingerprint
Jurnal Pembanding
Fingerprint
Fingerprint yang sama
Analisa PSNR Pada Teknik Steganografi Menggunakan Spread Spectrum
[2083,0] [906,4] [187,8] [677,13] [133,15] [550,20] [2049,20] [2684,26] [3617,29] [3140,30] [532,32] [866,37] [2091,38] [2789,40] [4455,41] [4665,42] …
Implementasi Steganografi Pesan Text Ke Dalam File Sound (.Wav) Dengan Modifikasi Jarak Byte Pada Algoritma Least Significant Bit (Lsb)
[116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1569,30] [4704,32] [1376,33] [223,37] [175,39] [3860,44] [4131,45] [680,46] …
[187,2187] [677,1931] [133,2643] [583,1394] [2230,3977] [1071,3580] [3978,763] [2384,6123] [401,104] [45,1136] ...
Analisa PSNR Pada Teknik Steganografi Menggunakan Spread Spectrum
[2083, 0] [906,4] [187,8] [677,13] [133,15] [550,20] [2049,20] [2684,26] [3617,29] [3140,30] [532,32] [866,37] [2091,38] [2789,40] [4455,41] [4665,42] …
Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0
[116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1647,30] [1154,31] [1752,36] [1540,40] [1144,43] [2311,48] [3832,49] [1330,50] …
[677,2100] [2049,7854] [532,873] [866,3285] [2091,4320] [400,1152] [1071,6069] [931,25] [3317,4561] [2384,2531]…
Analisa PSNR Pada Teknik Steganografi Menggunakan Spread Spectrum
[2083, 0] [906,4] [187,8] [677,13] [133,15] [550,20] [2049,20] [2684,26] [3617,29] [3140,30] [532,32] [866,37] [2091,38] [2789,40] [4455,41] [4665,42] …
Implementasi Sistem Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem
[3105,0] [5798,1] [3458,2] [103,3] [2517,8] [3100,9] [712,10] [754,15] [3921,20] [3074,21] [634,23] [217,27] [318,32] [5284,35] [7783,35] [7072,36] …
[906, 6232] [187, 13262] [550, 1057] [2049, 11683] [2684,1895] [3617, 3172] [532, 5577] [2789, 4367] [2383, 10775] [583, 5133] …
Kesamaan (%)
Lama Proses (s)
21.27
± 84.08
24.76
± 63.33
25.34
± 70.50
74
Pengujian pendeteksian kesamaan dengan proses stemming (lanjutan) Jurnal Uji Implementasi Kriptografi Dan Steganografi
Implementasi Kriptografi Dan Steganografi
Implementasi Kriptografi Dan Steganografi
Fingerprint
Jurnal Pembanding
Fingerprint
Fingerprint yang sama
[1115,0] [446,2] [1660,7] [2349,8] [3234,9] [4009,11] [882,12] [2202,17] [1516,18] [1125,19] [1929,24] [5270,27] [3282,29] [420,30] [3388,35] [3105,36] …
Implementasi Steganografi Pesan Text Ke Dalam File Sound (.Wav) Dengan Modifikasi Jarak Byte Pada Algoritma Least Significant Bit (Lsb)
[116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1569,30] [4704,32] [1376,33] [223,37] [175,39] [3860,44] [4131,45] [680,46] …
[1115,1936] [1660,5500] [882,1869] [2202,3814] [3282,3652] [3105,324] [2773,3707] [1646,1619] [2177,7111] [858,842] …
[1115,0] [446,2] [1660,7] [2349,8] [3234,9] [4009,11] [882,12] [2202,17] [1516,18] [1125,19] [1929,24] [5270,27] [3282,29] [420,30] [3388,35] [3105,36] …
Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0
[116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1647,30] [1154,31] [1752,36] [1540,40] [1144,43] [2311,48] [3832,49] [1330,50] …
[1660,7287] [2349,7794] [3234,3791] [4009,2898] [882,2038] [1516,6717] [420,530] [3105,4360] [5790,3720] [2773,3875] …
[1115,0] [446,2] [1660,7] [2349,8] [3234,9] [4009,11] [882,12] [2202,17] [1516,18] [1125,19] [1929,24] [5270,27] [3282,29] [420,30] [3388,35] [3105,36] …
Implementasi Sistem Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem
[3105,0] [5798,1] [3458,2] [103,3] [2517,8] [3100,9] [712,10] [754,15] [3921,20] [3074,21] [634,23] [217,27] [318,32] [5284,34] [7783,35] [7072,36] …
[446, 3295] [1660,503] [4009, 2303] [882, 544] [2202, 11625] [1125, 5708] [3105, 0] [2773, 7809] [1646, 318] [2177, 1466] …
Kesamaan (%)
Lama Proses (s)
20.68
± 61.67
22.40
± 59.77
23.40
± 64.00
75
Pengujian pendeteksian kesamaan dengan proses stemming (lanjutan) Jurnal Uji
Fingerprint
Jurnal Pembanding
Fingerprint
Fingerprint yang sama
Implementasi Steganography Menggunakan Metode Least Significant Bit (Lsb) Pada Mobile Phone Berbasis Symbian Os Implementasi Steganography Menggunakan Metode Least Significant Bit (Lsb) Pada Mobile Phone Berbasis Symbian Os Implementasi Steganography Menggunakan Metode Least Significant Bit (Lsb) Pada Mobile Phone Berbasis Symbian Os
[3105,0] [5798,1] [4405,2] [3211,5] [328,9] [5383,14] [1313,15] [630,17] [641,22] [2797,26] [3514,27] [4921,28] [4730,29] [2400,30] [975,31] [1130,36] …
Implementasi Steganografi Pesan Text Ke Dalam File Sound (.Wav) Dengan Modifikasi Jarak Byte Pada Algoritma Least Significant Bit (Lsb)
[116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1569,30] [4704,32] [1376,33] [223,37] [175,39] [3860,44] [4131,45] [680,46] …
[3105,324] [5798,1710] [4405,1711] [3211,1714] [328,845] [5383,850] [1313,2975] [630,772] [641,3130] [2797,3133] …
[3105,0] [5798,1] [4405,2] [3211,5] [328,9] [5383,14] [1313,15] [630,17] [641,22] [2797,26] [3514,27] [4921,28] [4730,29] [2400,30] [975,31] [1130,36] …
Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0
[116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1647,30] [1154,31] [1752,36] [1540,40] [1144,43] [2311,48] [3832,49] [1330,50] …
[3105, 4360][4405, 477] [3211, 311] [328, 145] [5383, 9402] [1313, 5477] [630, 2942] [641, 1712] [2797, 1717] [3514, 1718] …
[3105,0] [5798,1] [4405,2] [3211,5] [328,9] [5383,14] [1313,15] [630,17] [641,22] [2797,26] [3514,27] [4921,28] [4730,29] [2400,30] [975,31] [1130,36] …
Implementasi Sistem Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem
[3105,0] [5798,1] [3458,2] [103,3] [2517,8] [3100,9] [712,10] [754,15] [3921,20] [3074,21] [634,23] [217,27] [318,32] [5284,34] [7783,35] [7072,36]…
[3105,0] [5798,1] [4405,5681] [3211,11085] [641,12807] [2797,4941] [3514,9348] [4921,12814] [4730,4514] [2400,12816] …
Kesamaan (%)
Lama Proses (s)
20.83
± 111.90
25.79
± 84.37
25.49
± 68.81
76
2. Pengujian pendeteksian kesamaan dengan tanpa proses stemming Jurnal Uji Analisa PSNR Pada Teknik Steganografi Menggunakan Spread Spectrum
Analisa PSNR Pada Teknik Steganografi Menggunakan Spread Spectrum
Analisa PSNR Pada Teknik Steganografi Menggunakan Spread Spectrum
Fingerprint [2083,0] [906,4] [187,8] [677,13] [133,15] [550,20] [2049,24] [2684,26] [3617,29] [3140,30] [532,32] [866,37] [2091,38] [2789,40] [4455,41] [4665,42] … [2083,0] [906,4] [187,8] [677,13] [133,15] [550,20] [2049,24] [2684,26] [3617,29] [3140,30] [532,32] [866,37] [2091,38] [2789,40] [4455,41] [4665,42] … [2083,0] [906,4] [187,8] [677,13] [133,15] [550,20] [2049,24] [2684,26] [3617,29] [3140,30] [532,32] [866,37] [2091,38] [2789,40] [4455,41] [4665,42] …
Jurnal Pembanding Implementasi Steganografi Pesan Text Ke Dalam File Sound (.Wav) Dengan Modifikasi Jarak Byte Pada Algoritma Least Significant Bit (Lsb)
Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0
Implementasi Sistem Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem
Fingerprint [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1361,30] [612,31] [4006,36] [734,38] [175,43] [3860,48] [4131,49] [680,50] … [116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [914,30] [3545,35] [7318,37] [4357,38] [7156,43] [7069,44] [3172,47] [996,50] … [3105,0] [5798,1] [3458,2] [103,3] [2517,8] [4020,9] [6145,12] [6506,13] [4036,14] [688,16] [2009,21] [4657,22] [696,23] [1091,28] [6146,32] [2048,33] …
Kesamaan (%)
Lama Proses (s)
[906,9306] [677,2847] [133,232] [550,3885] [3140,7885] [4455,2921] [2118,6556] [400,1552] [583,1183] [302,151] …
34.13
± 44.26
[2083,8649] [906,8591] [187,1425] [677,3904] [133,9325] [550,12663] [2049,14397] [2684,12996] [532,12370] [866,12750] …
39.21
± 38.11
[2083, 19135] [906, 350] [187, 4960] [677, 1494] [550, 1595] [2684, 5977] [3617, 5657] [3140, 14386] [532, 20835] [862, 1221] …
40.13
± 47.95
Fingerprint yang sama
77
Pengujian pendeteksian kesamaan dengan tanpa proses stemming (lanjutan) Jurnal Uji Implementasi Kriptografi Dan Steganografi
Implementasi Kriptografi Dan Steganografi
Implementasi Kriptografi Dan Steganografi
Fingerprint
Jurnal Pembanding
Fingerprint
Fingerprint yang sama
Kesamaan (%)
Lama Proses (s)
[1667,0] [1503,2] [337,7] [3234,12] [4009,16] [882,17] [2202,22] [1516,24] [1125,29] [1929,32] [5270,34] [3282,35] [3388,40] [3105,41] [5790,46] …
Implementasi Steganografi Pesan Text Ke Dalam File Sound (.Wav) Dengan Modifikasi Jarak Byte Pada Algoritma Least Significant Bit (Lsb)
[116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1361,30] [612,31] [4006,36] [734,38] [175,43] [3860,48] [4131,49] [680,50] …
[1667, 2004] [337,133] [4009,7525] [882,3324] [2202,1244] [1516,5695] [1929,6893] [3282,6456] [3105,654] [5790,657] ...
30.93
± 43.83
[1667,0] [1503,2] [337,7] [3234,12] [4009,16] [882,17] [2202,22] [1516,24] [1125,29] [1929,32] [5270,34] [3282,35] [3388,40] [3105,41] [5790,46] …
Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0
[116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [914,30] [3545,35] [7318,37] [4357,38] [7156,43] [7069,44] [3172,47] [996,50] …
[1667,6011] [1503,3331] [337,195] [3234,7469] [882,3839] [2202,1167] [1516,12373] [3105,3534] [5790,16245] [2773,7235] …
34.62
± 43.48
[1667,0] [1503,2] [337,7] [3234,12] [4009,16] [882,17] [2202,22] [1516,24] [1125,29] [1929,32] [5270,34] [3282,35] [3388,40] [3105,41] [5790,46] …
Implementasi Sistem Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem
[3105,0] [5798,1] [3458,2] [103,3] [2517,8] [4020,9] [6145,12] [6506,13] [4036,14] [688,16] [2009,21] [4657,22] [696,23] [1091,28] [6146,32] [2048,33] …
[3105, 41] [103, 13765] [4020, 11567] [4036, 11548] [696, 8252] [1091, 95] [6146, 100] [2048, 101] [1757, 14318] [325, 250] …
35.60
± 42.59
78
Pengujian pendeteksian kesamaan dengan tanpa proses stemming (lanjutan) Jurnal Uji Implementasi Steganography Menggunakan Metode Least Significant Bit (Lsb) Pada Mobile Phone Berbasis Symbian Os Implementasi Steganography Menggunakan Metode Least Significant Bit (Lsb) Pada Mobile Phone Berbasis Symbian Os Implementasi Steganography Menggunakan Metode Least Significant Bit (Lsb) Pada Mobile Phone Berbasis Symbian Os
Fingerprint
Jurnal Pembanding
Fingerprint
Fingerprint yang sama
Kesamaan (%)
Lama Proses (s)
[3105,0] [5798,1] [4405,2] [3211,5] [328,9] [5383,14] [1245,15] [1134,19] [1687,24] [2037,29] [2080,31] [641,32] [2797,37] [3514,38] [4921,39] [4730,40] …
Implementasi Steganografi Pesan Text Ke Dalam File Sound (.Wav) Dengan Modifikasi Jarak Byte Pada Algoritma Least Significant Bit (Lsb)
[116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [1361,30] [612,31] [4006,36] [734,38] [175,43] [3860,48] [4131,49] [680,50] …
[3105,654] [5798,3150] [4405,3151] [3211,3154] [5383,2598] [1245,4826] [1687,4241] [2037,4246] [641,5461] [2797,2924] …
34.74
± 63.60
[3105,0] [5798,1] [4405,2] [3211,5] [328,9] [5383,14] [1245,15] [1134,19] [1687,24] [2037,29] [2080,31] [641,32] [2797,37] [3514,38] [4921,39] [4730,40] …
Perancangan Perangkat Lunak Steganografi Audio MP3 Menggunakan Metode Least Significant Bit (LSB) Dengan Visual Basic 6.0
[116,0] [652,4] [173,7] [529,12] [1056,17] [1023,19] [848,23] [619,25] [914,30] [3545,35] [7318,37] [4357,38] [7156,43] [7069,44] [3172,47] [996,50] ...
[3105, 3534] [3211, 1117] [328, 17081] [5383, 17086] [1245, 14338] [1134, 671] [1687, 676] [2037, 681] [2080, 3725] [641, 3339] …
39.28
± 51.10
[3105,0] [5798,1] [4405,2] [3211,5] [328,9] [5383,14] [1245,15] [1134,19] [1687,24] [2037,29] [2080,31] [641,32] [2797,37] [3514,38] [4921,39] [4730,40] …
Implementasi Sistem Keamanan Data dengan Menggunakan Teknik Steganografi End of File (EOF) dan Rabin Public Key Cryptosystem
[3105,0] [5798,1] [3458,2] [103,3] [2517,8] [4020,9] [6145,12] [6506,13] [4036,14] [688,16] [2009,21] [4657,22] [696,23] [1091,28] [6146,32] [2048,33] …
[3105,0] [5798,1] [3211,18246] [1245,7545] [1687,508] [2037,3230] [641,22178] [2797,8630] [3514,22184] [4921,22185] …
40.22
± 39.96
79