##plugins.themes.bootstrap3.article.main##

Luthfi Ahmad Rifqi
T.M Diansyah
Imran Lubis

Abstract

The application of technology in the field of data and information security has been carried out a lot. Threats to information security can occur when the information sent is not addressed to everyone but only to certain people, especially if the information provided is confidential. Currently there have been many crimes in cyberspace, where confidential information can be taken by a hacker without being noticed. This raises concerns for the owner of the confidential information. So the purpose of this thesis research is to create a Website for Security and Concealment of Secret Messages with the RC4 Method and Adaptive Pattern which aims to keep secret or hide hidden information so that it is not spread to other unauthorized parties. In the research that has been done, the messages that have been entrusted do not make significant changes to other digital data. It would not physically attract the attention of a potential attacker or hacker, for example an image that looks harmless or not potentially attackable.

##plugins.themes.bootstrap3.article.details##

How to Cite
Rifqi, L. A., T.M Diansyah, & Lubis, I. (2025). WEBSITE SECURITY AND HIDING OF SECRET MESSAGES WITH RC4 METHOD AND ADAPTIVE PATTER. Instal : Jurnal Komputer, 17(04), 164–173. https://doi.org/10.54209/jurnalinstall.v17i04.372
References
[1] Ardiansyah, A., & Kurniasih, M. (2018). Penyembunyian Pesan Rahasia Pada Citra Digital Dengan Teknik Steganograpi Menggunakan Metode Least Significant Bit. Jurnal Teknologi Informasi, XIII(3), 96-101.
[2] Anggraini, Ema Utami. (2017). Analisis Penyisipan Data pada Citra Bitmap
[3] menggunakan Metode Bit Plane Complexity Segmentation, diakses pada tanggal17Februari2017,darihttp://p3m.amikom.ac.id/detail.php?id=62&Analisis-Penyisipan-Data-Pada-Citra-Bitmap-Menggunakan-Metode-Bit-Plane Complexcity-Segmentation.
[4] Ariyanto. (2020). Analisis Implementasi Algoritma Stream Cipher Sosemanuk dan Dicing dalam Proses Enkripsi Data. Seminar Nasional Informatika, 351-357.
[5] Fachri. (2020). Steganografi Citra Ke Dalam Citra Menggunakan Metode Least Significant Bit, Run-Length Encoding dan Linear Congruential Generator Steganography. 1–10.
[6] Furqan, M., Sriani, S., & Siregar, Y. K. (2020). Perbandingan Algoritma Contraharmonic Mean Filter dan Arithmetic Mean Filter untuk Mereduksi Exponential Noise. JISKA (Jurnal Informatika Sunan Kalijaga), 5(2), 107– 115. https://doi.org/10.14421/jiska.2020.52-05
[7] Ginni. (2022). E-filing of Taxes – A Research Paper. International Journal of Enterprise Computing and Business Systems Volume 2, Issue 1, January2012. pp1-8.
[8] Hastanti, R. P., Purnama, B. E., & Wardati, I. U. (2018). Sistem Penjualan Berbasis Web (E-Commerce) Pada Tata Distro Kabupaten Pacitan. Jurnal Bianglala Informatika, 3(2).
[9] Hermawati. (2020). Pengolahan Citra Digital, Yogyakarta.
[10] Ichsan. (2018). Perancangan dan Pembuatan Sistem Visual Inspection Sebagai
Seleksi Buah Tomat Berdasarkan Kematangan Berbasis Web Camera.
[11] Karim. (2017). Studi Dan Implementasi Penggabungan Steganografi Dan Kriptografi Metode End Of File (EOF) Dan Advanced Encryption Standard (AES), Skripsi, Teknik Informatika Dan Matematika, Universitas Bina Nusantara, Jakarta.
[12] Malese, L. P. (2021). Penyembunyian Pesan Rahasia Pada Citra Digital dengan Teknik Steganografi Menggunakan Metode Least Significant Bit (LSB ). Jurnal Ilmiah Wahana Pendidikan, 7(5), 343-354.
[13] Munir, Rinaldi, 2018. Pengolahan Citra Digital dengan Pendekatan Algoritmik,Informatika Bandung.
[14] Munir. (2017). Pembelajaran Digital. Tersedia pada laman web: http://file.upi.edu/Direktori/FPMIPA/PRODI._ILMU_KOMPUTER/196603252001121-MUNIR/BUKU/Pembelajaran%20Digital.pdf: https://www.google.com/. Diakses Psds 20 Maret 2019.
[15] Nurdin. (2017). Analisa Dan Implementasi Kriptografi Pada Pesan Rahasia Menggunakan Algoritma Cipher Transposition. Vol.3 No.1. http://http://lppm.unfari.ac.id/assets/file/55-188-1-PB.pdf
[16] Rifai, Santoso, Christyono. (2019). Implementasi Algoritma Kriptografi RivestCode 4, Rivest Shamir Adleman, dan Metode Steganografi Untuk Pengamanan Pesan Rahasia Pada Berkas Teks Digital. TRANSIENT, vol.5(No.1),p. 87.
[17] Rihartanto, Utomo, D. B., & Rizal, A. (2019). IMPLEMENTASI IMAGE TILLING PADA PENYEMBUNYIAN PESAN MENGGUNAKAN LSB. Proceeding SINTAK 2019, 186-192.
[18] Rudianto. 2023. “Pemrograman Web Dinamis Menggunakan PHP dan MySQL”. Yogyakarta
[19] Rustad, S., Setiadi, D. I., Syukur, A., & Andono, P. N. (2022). Inverted LSB image steganography using adaptive pattern to improve imperceptibility. Journal of King Saud University – Computer and Information Sciences, 34, 3559-3568.
[20] Santi. (2018). Sistem Informasi Pengarsipan Surat- Surat pada PT SinergiPerkebunan Nusantara. Jurnal Ilmiah Intech : Information Technology Journal of UMUS , 51-60.
[21] Schneier, Wiley. (2019)“Applied Cryptography Second Edition: protocol, algorithm, and source code in C”; John Wiley and Son.
[22] Sebok, Vermat. (2018). Discovering Computer 2018 (Digital Technology, Data, and Device). Boston: Cengage Learning.
[23] Sholeh. (2018). Mengamankan skrip pada bahasa pemprograman PHP denganSulistiyani, (2017). Dipetik dari http://repository.ump.ac.id/4953
[24] Supriadi, Novantar. (2008). Digital Image Processing Third Edition, Pearson Prentice Hall, Upper Saddle River, New Jersey.
[25] Susilowati. (2017), Implementasi Algoritma Kriptografi RSA pada Keamanan Data Transkip Nilai Mahasiswa UNM Jurusan Matematika Menggunakan Bahasa Pemrograman PHP, Skripsi, Prodi Matematika, Jurusan Matematika, Fakultas Matematika dan Ilmu Pengetahuan Alam, Universitas Negeri Makassar: Makassar