Smart Blockchain Technology in Image Processing Between Challenges, Transformation and Digital-Based Learning Solutions
Sari
Kata Kunci
Teks Lengkap:
PDFReferensi
Rifqi, Muhammad, Combining Steganography And Cryptograph Techniques For Data Security (Case Study In PT XYZ), International Research Journal of Computer Science (IRJCS), Vol.5, Issue 01 January 2018
Internet Usage Statistic, www.internetworldstats.com/stats.html, accessed May 13, 2013.
M. Conway, Code Wars: Steganography, Signals Intelligence, and Terrorism, Knowledge Technology & Policy , Volume 16, Number 2, pp. 45-62, Springer, 2003. 4. RJ Anderson and FAP Petitcolas, On The Limits of Steganography , IEEE Journal of Selected Areas in Communications, 16 (4), pp.474-481, May 1998, ISSN 0733-8716.
C. Hosmer, Discovering Hidden Evidence , Taylor & Francis Group, Journal of Digital Forensic Practice, Vol. No.1, pp.47-56, 2006.
AJ Raphael and V. Sundaram, Cryptography and Steganography - A Survey , Int. J. Comp. Tech. Appl., Vol 2 (3), pp. 626-630, ISSN: 2229-6093.
SA Laskar and K. Hemachandran, An Analysis of Steganography and Steganalysis Techniques, Assam University Journal of Science and Technology, Vol.9, No. II, pp.83- 103, January, 2012, ISSN: 0975-2773.
NF Johnson and S. Jajodia, Exploring Steganography: Seeing the Unseen, IEEE, Computer, vol. 31, no. 2, pp. 26- 34, Feb. 1998.
Menezes. J. Alfred, Paul C. Van Oorschot, Scott A. Vanstone, Applied Cryptography, 1996.
E. Walia, P. Jain and Navdeep, An Analysis of LSB & DCT based Steganography , Global Journal of Computer Science and Technology, Vol. 10 Issue 1 (Ver 1.0), pp 4-8, April , 2010 .
BB Zaidan, AA Zaidan, AK Al-Frajat and HA Jalab, On the Differences between Hiding Information and Cryptography Techniques: An Overview, Journal of Applied Sciences, Vol.10, No.15, pp.1650-1655, 2010.
RS Ramesh, G. Athithan and K. Thiruvengadam, An Automated Approach to Solve Simple Substitution Ciphers , Taylor & Francis, Cryptologia, Vol. XVII, No. 2, pp. 202- 218, April, 1993.
WF Friedman, Cryptology, Encyclopedia Britannica, Vol. 6, pp. 844-851, 1967. 14. Atul Kahate, Cryptography and Network Security, 2nd Edition, Tata McGraw-Hill, 2008.
Fauzan, N.I (2018). Teknologi blockchain dan Peranannya dalam Era Digital. Jurnal BJB University.
AJ Raphael and V. Sundaram, Cryptography and Steganography - A Survey , Int. J. Comp. Tech. Appl., Vol 2 (3), pp. 626-630, ISSN: 2229-6093.
Munir, Rinaldi, 2009, Steganography and Watermarking, http://www.informatika.org/~ rinaldi / Cryptography / Steganography% 20and% 20Watermarking.pdf, accessed on 26 May 2013.
Untung Rahardja, Qurotul Aini, 2020, Penerapan Teknologi Blockchain Sebagai Media Pengamanan Proses Transaksi E-Commerce CESS (Journal of Computer Engineering System and Science) Vol. 5 No. 1 Januari 2020, ISSN :2502-7131
Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. Ieee Access, 4, 2292- 2303.
Sutandi, S. (2018). Pengaruh BigData dan Teknologi Blockchain terhadap Model Business Model Canvas. Jurnal Logistik Indonesia, 2(1), 9-20.
DOI: http://dx.doi.org/10.33603/jste.v2i1.7063
Refbacks
- Saat ini tidak ada refbacks.