APPLICATION OF CRT (CHINESE REMINDER THEOREM) TO SPEED UP THE PROCESS OF DATA SECURITY ON IMAGE FILES

##plugins.themes.academic_pro.article.main##

Syaufi Arbin
Arpan
Eko Hariyanto

Abstract





The purpose of this study is to use the Chinese Remainder Theorem approach to create a data security application system and to improve the data security of a confidential file, particularly data that uses image files. Observation and literature review were employed in this study to acquire data. The traditional approach is used to share data, in this case a secret message in the form of text. The embedding process and the extraction process are the two fundamental procedures in message insertion utilizing the Least Significant Bit approach. The Least Significant Bit steganography technique was used to replace the secret message bits in the final bit of each color component of the image pixels, according to the results. So that the image size does not change, only one message bit (value 0 or 1) is placed into one color component of the image. Furthermore, the processing time is affected by the size of the file, the length of the key, and the computer processor performance.





##plugins.themes.academic_pro.article.details##

How to Cite
Syaufi Arbin, Arpan, & Eko Hariyanto. (2022). APPLICATION OF CRT (CHINESE REMINDER THEOREM) TO SPEED UP THE PROCESS OF DATA SECURITY ON IMAGE FILES. INFOKUM, 10(02), 1312-1320. Retrieved from https://infor.seaninstitute.org/index.php/infokum/article/view/641

References

[1] Arjana, P. H. (2012). Implementasi Enkripsi Data Dengan Algoritma LSB. Seminar Nasional Teknologi Informasi Dan Komunikasi (SENTIKA).
[2] Gunawan. (2013). Implementasi Hidden Message pada Citra Menggunakan Metode End of File. Universitas Widyatama.
[3] Mulyana, T. (2012). Steganografi Citra Digital Menggunakan Spreadsheet. 8(2).
[4] Pabokory, F. N. (2015). Implementasi LSB Pengamanan Data Pada Pesan Teks, Isi File Gambar Menggunakan Algoritma Advanced Encryption Standard. 10(1).
[5] Putra, D. (2010). Pengolahan Citra Digital. Andi Offset.
[6] Wahana Komputer. (2003). Memahami Model Enkripsi dan Security Data. Penerbit Andi.
[7] Zebua, T. (2017). PENGAMANAN CITRA DIGITAL BERDASARKAN MODIFIKASI ALGORITMA RC4. Jurnal Teknologi Informasi Dan Ilmu Komputer, 4(4). https://osf.io/preprints/inarxiv/nzfd4/