Main Article Content

Muhamad Maksum Hidayat
Wahyu Nugroho
Dony Ariyus

Abstract

Cryptography implementations are now widely solved by cryptanalyst in the process of securing a messaging system, and therefore the need to add a method of steganography. Steganography is the art of hiding secret messages in any medium other than the sender and receiver that no one would know or realize there is a secret message in the media is sent. In this journal, conducted a study on the implementation of cryptography in the form of encryption and decryption of a message using the Playfair cipher algorithm is modified by letter hijaiyah. Then the implementation of steganography in a PNG image media, the testing process is done by sending the media image using email, whatsapp, facebook, and telegram. research aims to make the encryption process stronger and more secure,

Downloads

Download data is not yet available.

Article Details

How to Cite
Hidayat, M. M., Nugroho, W. and Ariyus, D. (2020) “Implementation Of Message Security In Pictures Using Playfair Chiper Algorithm: Implementation Of Message Security In Pictures Using Playfair Chiper Algorithm”, Jurnal Mantik, 3(4), pp. 420-427. Available at: https://iocscience.org/ejournal/index.php/mantik/article/view/585 (Accessed: 17April2026).
References
[1] N. W. Sari, “Kejahatan Cyber dalam Perkembangan Teknologi Informasi Berbasis Komputer,” J. Surya Kencana Dua Din. Masal. Huk. dan Keadilan, vol. 5, no. 2, pp. 577–593, 2018.
[2] E. Setyaningsih, “Penyandian Citra Menggunakan Metode Playfair Cipher,” J. Teknol., vol. 2, pp. 213–219, 2009.
[3] A. Hariati, “Kombinasi Algoritma Playfair Cipher Dengan Metode Zig-zag Dalam Penyandian Teks,” J. Penelit. Tek. Inform., vol. 2, no. 2, pp. 13–17, 2018.
[4] A. Syahputra, “Analisa Implementasi Pengamanan File Audio Menggunakan Algoritma Playfair,” J. Pelita Inform., vol. 17, no. 4, pp. 366–374, 2018.
[5] E. H. Nurkifli, “Modifikasi Algoritma Playfair Dan Menggabungkan Dengan Linear Feedback Shift Register ( Lfsr ),” in Seminar Nasional Teknologi Informasi dan Komunikasi 2014 (SENTIKA 2014), 2014, pp. 366–371.
[6] A. Rohmanu, “Implementasi Kriptografi dan Steganografi Dengan Metode Algoritma Des dan Metode End Of File,” J. Inform. SIMANTIK, vol. 1, no. 2, pp. 1–11, 2017.
[7] P. S. Eka, “Implementasi Keamanan Data Menggunakan Algoritma Vernam Cipher Dan Playfair Cipher,” J. Pelita Inform., vol. 17, no. 4, pp. 430–435, 2018.
[8] M. Z. Siambaton and A. Muhazir, “Modifikasi Algoritma Playfair Cipher Dengan Pengurutan Array Pada Matriks,” J. Ilmu Komput. dan Inform., vol. 02, no. April, pp. 66–71, 2018.
[9] B. Priyatna, U. Buana, and P. Karawang, “PENGAMANAN DATA BERBASIS MOBILE ANDROID DENGAN PENGAMANAN DATA BERBASIS MOBILE ANDROID DENGAN PENGGABUNGAN LINEAR FEEDBACK SHIFT REGISTER ( LFSR ) DAN MODIFIKASI MATRIKS,” J. Telemat. MKOM, vol. 10, no. 1, 2018.
[10] H. Al Fatta, Analisis Perancangan Sistem Operasi Untuk Keunggulan Bersaing Perusahaan dan Organisasi Modern. Yogyakarta: Andi Offset, 2007.