RANCANG BANGUN WEBSITE BADAN PENGAWAS PEMILIHAN UMUM (BAWASLU) KALIMANTAN TENGAH

Authors

  • Ade Chandra Saputra universitas Palangka Raya
  • Agus Sehatman Saragih universitas Palangka Raya

DOI:

https://doi.org/10.47111/jti.v13i1.279

Keywords:

Algoritma Rijndael, waterfall

Abstract

The misuse of digital image images is increasing, data or information that is of a personal nature can easily be known by others who are not entitled through digital images. This can cause material and immaterial losses to people whose personal information is misused by others. Then the application applies the Rijndael algorithm to secure digital image images which contain information or data that is of a personal nature. In securing digital image images, Rijndael's algorithm is used to protect the information contained in the image, the algorithm runs with processes such as SubBytes, ShiftRows, MixColumns, and AddRoundKey. The methodology applied is data collection methods such as field studies and literature studies, then Waterfall software development methods (Communication, Planning, Modeling, Construction, and Deployment) for system design

Downloads

Download data is not yet available.

References

[1] Aprianto dk,. 2014, Rancang Bangun Aplikasi Enkripsi dan Dekripsi Gambar digital Menggunakan Algoritma Rijndael Berbasis Java SE. STMIK GI MDP.
[2] Bendi, 2012, Implementasi Algoritma RijndaelUntuk Enkripsi dan Dekripsi Pada Citra Digital. Universitas Katolik Musi Charitas.
[3] Bruce Schneier, 1996, Section 14.1 GOST, in Applied Cryptography, Second Edition. ISBN 0-471-11709-9
[4] Deni Darmawan & Deden Hendra Permana. 2013. Desain dan Pemrograman
[5] Website. Penerbit PT Remaja Rosdakarya : Bandung.
[6] Dony Ariyus, 2006, Kriptografi : Keamanan Data dan Komunikasi, Cetakan Pertama, Penerbit GRAHA ILMU, Yogyakarta.
[7] Dony Ariyus, 2008, Pengantar Ilmu Kriptografi: Teori Analisis & Implementasi, Penerbit GRAHA ILMU, Yogyakarta.
[8] Irfan, 2016, Aplikasi Enkripsi Citra Menggunakan Algoritma Kriptografi Arnold Cat Map Dan Logistic Map. STMIK Bumigora : Mataram.
[9] Jogiyanto Hartono, 2005, Analisis dan Desain Sistem Informasi. Pendekatan Tersetruktur Teori dan Praktis Aplikasi Bisnis, Andi : Yogyakarta.
[10] Kustiyaningsih, Yeni. 2011, Pemrograman Basis Data Berbasis Web menggunakan PHP dan MySQL. Penerbit Graha Ilmu : Yogyakarta.
[11] Munir, 2012, Analisis Keamanan Algoritma Enkripsi Citra Digital Menggunakan Kombinasi Dua Chaos Map dan Penerapan Teknik Selektif. ITB : Bandung.
[12] Setyanigsih Emy, 2015, Kriptografi & Implementasinya Menggunakan Matlab, Andi Publisher : Yogyakarta.
[13] Shiral, et. Al, 2015, An Approach to Rijndael Algorithm, tersedia pada http://www.jiaats.com/Journals-Pdf/February-2015/jase/Feb-Jase-1.pdf diakses pada tanggal 16 Februari 2018.
[14] Soumya, 2013. Design and Implementation of Rijndael Encryption Algorithm Based on FPGA. JITS : India.
[15] Supriyanto, 2008, Teknik Informasi & Komunikasi SMP Kelas VII, Yudhistira : Yogyakarta.
[16] Suryadi dkk, 2014. Implementasi Algoritma Enkripsi Citra Digital Menggunakan Skema Transposisi Berbaris Pada Fungsi Chaos. FMIPA Universitas Indonesia.
[17] Rifki Sadikin, 2012, Kriptografi Untuk Keamanan Jaringan. Penerbit ANDI : Yogyakarta.
[18] Rinaldi Munir, 2006, Kriptografi, Penerbit INFORMATIKA, Bandung.
[19] http://searchsecurity.techtarget.com/definition/rijndael, diakses pada tanggal 20 April 2017.
[20] http://metode-algoritma.com/2013/06/algoritma-rijndael.html, diakses pada tanggal 20 April 2017.
[21] http://iliketowastemytime.com/2012/06/22/soviet-censorship-of-images-during-stalins-regime-t-pics, diakses pada tanggal 21 April 2017.





Stendy B. Sakur. (2010). PHP 5 Pemograman Berorientasi Objek.Yogyakarta:Penerbit Andi.
Sutanta, E., (2004). Sistem Basis data. Yogyakarta: Penerbit Graha Ilmu.
S, Rosa A. dan M. Shalahuddin. (2014). Rekayasa Perangkat Lunak Terstruktur dan Berorientasi Objek.Bandung:Informatika Bandung.
Widiarty, W. (2017). Rancang Bangun Website Sistem Informasi Praktikum Jurusan Teknik Informatika Univeritas Palangka Raya. Jurnal SAINTEKOM, 6(2), 12-24

Downloads

Published

2019-10-30