UMM Institutional Repository


Sumarta, Novan Tri (2019) IMPLEMENTASI DAN ANALISA STEGANOGRAPHIC SCHEME VISUAL CRYPTOGRAPHY. Bachelors Degree (S1) thesis, University of Muhammadiyah Malang.


Download (809kB) | Preview
BAB I.pdf

Download (335kB) | Preview
BAB II.pdf

Download (532kB) | Preview
[img] Text
Restricted to Registered users only

Download (429kB) | Request a copy
[img] Text
BAB IV.pdf
Restricted to Registered users only

Download (544kB) | Request a copy
[img] Text
BAB V.pdf
Restricted to Registered users only

Download (92kB) | Request a copy


Visual cryptography is a cryptographic algorithm that is applied to images. This cryptographic method does not require computation in the decryption process, only human visual abilities are required. Cryptographic visual schemes seem very difficult to cheat because fraudsters do not know difficult information on the original stock and there is no information about the distribution of black and white screens from share images. Cheaters can still deceive visual cryptography by creating fake share images. Adding quality steganography to visual cryptography has been done by Biswapati. Jana in a study entitled "Prevention of Cheating in Visual Cryptography using Steganography Schemes". Steganographic relationships are used to insert a secret code into the share image which then becomes stegoshare. Application of Cheating Prevention in Visual Cryptography using the Steganography Scheme still requires the extraction process to carry out the extraction process and comparison of secret messages before conducting the research process, through the research of Moni Naor [1] and Chih-Ming Hu [2] explaining the need for computing processes for decryption. Hodeish [4] and Mahmudah [5] review in their research on what proves visual cryptography still has the same performance problems, it is related to the quality of the decryption results. Problems in the algorithm that have emerged then become the idea of this research. The steps taken in this research are to eliminate the secret message extraction process that requires computing and immediately carry out the decryption process.

Item Type: Thesis (Bachelors Degree (S1))
Student ID: 201310370311324
Thesis Advisors: Ali Sofyan Kholimi (0701078206), Diah Risqiwati (0716018202)
Keywords: Visual cryptography, steganography, image processing
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Engineering > Department of Informatics (55201)
Depositing User: 201310370311324
Date Deposited: 23 Aug 2019 02:25
Last Modified: 23 Aug 2019 02:25

Actions (login required)

View Item View Item
UMM Official

© 2008 UMM Library. All Rights Reserved.
Jl. Raya Tlogomas No 246 Malang East Java Indonesia - Phone +62341464318 ext. 150, 151 - Fax +62341464101
E-Mail : infopus[at] - Website : - Online Catalog : - Repository :

Web Analytics

UMM Institutional Repository is powered by :
EPrints Logo