Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra

Hermansa H, Rusydi Umar, Anton Yudhana


Security in the protection of sending messages is a matter that must be considered, because the more the development of the age, the more sophisticated the technology. So that security in sending messages and data communication should be of more concern. Therefore we need a method or algorithm that can protect the message to be sent to the recipient of the message. The algorithm that can be used in encrypting is Caesar Cipher, as a cryptographic coding technique for messages so that messages that look difficult to read and solve. As for the method of inserting messages on encrypted image media using the End of File (EOF) steganography method, which is the method used directly at the end of the file. In the work of securing techniques of messages on this system, using various sizes of images or images that will be inserted a coded secret message or encryption whose capacity is not much different from the photos or images to be used. The conclusion of this study is that the application of the Caesar Cipher Algorithm can be used as a message security technique even though the algorithm is so simple but the level of security is assisted by the End of File (EOF) method to insert the encryption results from the Caesar Cipher algorithm so that the security level it has is sufficient to protect message information to be safe from eavesdroppers or hackers of the message that is not responsible or as a protection of data held.

Full Text:



A. Yudhana, I. Riadi, and F. Ridho, “DDoS classification using neural network and naïve bayes methods for network forensics,” Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 11, pp. 177–183, 2018.

R. Umar, A. Yudhana, and M. N. Faiz, “Experimental analysis of web browser sessions using live forensics method,” Int. J. Electr. Comput. Eng., vol. 8, no. 5, pp. 2951–2958, 2018.

I. Riadi, R. Umar, and I. M. Nasrulloh, “Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij),” vol. 3, no. 1, pp. 70–82, 2018.

M. I. Syahib, I. Riadi, and R. Umar, “Analisis Forensik Digital Aplikasi Beetalk Untuk Penanganan,” Semin. Nas. Inform. 2018 (semnasIF 2018) UPN ”Veteran” Yogyakarta, 24 Novemb. 2018, vol. 2018, no. November, p. 134, 2018.

N. Anwar and I. Riadi, “Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web,” J. Ilm. Tek. Elektro Komput. dan Inform., vol. 3, no. 1, p. 1, 2017.

I. Zuhriyanto et al., “Perancangan Digital Forensik Pada Aplikasi,” vol. 2018, no. November, pp. 86–91, 2018.

I. Riadi, A. Yudhana, and M. C. F. Putra, “Akuisisi Bukti Digital Pada Instagram Messenger Berbasis Android Menggunakan Metode National Institute of Justice (Nij),” J. Tek. Inform. dan Sist. Inf., vol. 4, no. 2, pp. 219–227, 2018.

M. H. Arif and A. Z. Fanani, “Kriptografi Hill Cipher Dan Least Significant Bit Untuk Keamanan Pesan Pada Citra,” CSRID (Computer Sci. Res. Its Dev. Journal), vol. 8, no. 1, p. 60, 2016.


P. Fitriani and T. S. Alasi, “Pengamanan Pesan Dengan Teknik Steganografi Menggunakan Metode Least Significant Bit Pada Citra Digital,” J. Inf. Komput. Log., vol. 1, no. 2, pp. 35–38, 2019.

B. V. Indriyono, “Implementasi Sistem Keamanan File dengan Metode Steganografi EOF dan Enkripsi Caesar Cipher,” Sisfo, vol. 06, no. 01, pp. 1–16, 2016.

M. K. Achmad Ardiansyah, “Penyembunyian Pesan Rahasia Pada Citra Digital Dengan Teknik Steganografi Menggunakan Metode Least Significant Bit (LSB),” J. Teknol. Inf., vol. XIII, no. November, pp. 96–101, 2018.

A. Rohmanu, “Implementasi Kriptografi dan Steganografi Dengan Metode Algoritma Des dan Metode End Of File Ajar Rohmanu,” J. Inform. SIMANTIK, vol. 1, no. 2, pp. 1–11, 2017.

I. Gunawan, “Penggunaan Algoritma Kriptografi Steganografi Least Significant Bit Untuk Pengamanan Pesan Teks dan Data Video,” J-SAKTI (Jurnal Sains Komput. dan Inform., vol. 2, no. 1, p. 57, 2018.

M. Zarlis and dan Tulus, “Pengamanan Data dengan Kombinasi Teknik Kriptografi Rabin dan Teknik Steganografi Chaotic LSB,” 2015.

S. Anwar, M. I. Komputer, and U. B. Luhur, “Implementasi Pengamanan Data Dan Informasi Dengan,” pp. 37–42, 2017.

D. Kusumaningsih, A. Pudoli, and I. Rahmadan, “Steganografi Metode End of File Untuk Keamanan Data,” vol. 9, no. 1, pp. 47–55, 2017.



  • There are currently no refbacks.

J-SAKTI (Jurnal Sains Komputer & Informatika)
Published Papers Indexed/Abstracted By:

Jumlah Kunjungan :

View My Stats