Post on 12-Mar-2019
Team project ©2017 Dony Pratidana S. Hum | Bima Agus Setyawan S. IIP
Hak cipta dan penggunaan kembali:
Lisensi ini mengizinkan setiap orang untuk menggubah, memperbaiki, dan membuat ciptaan turunan bukan untuk kepentingan komersial, selama anda mencantumkan nama penulis dan melisensikan ciptaan turunan dengan syarat yang serupa dengan ciptaan asli.
Copyright and reuse:
This license lets you remix, tweak, and build upon work non-commercially, as long as you credit the origin creator and license it on your new creations under the identical terms.
DAFTAR PUSTAKA
Asuni, N., & Giachetti, A. (2015). TESTIMAGES: A Large Data Archive For Display and
Algorithm Testing. Journal of Graphics Tools, Volume 17, Issue 4, 113-125.
Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on
3D chaotic cat maps. Chaos, Solitons and Fractals, vol. 21, no. 3, 749-761.
Chhabra, V., & Sundaram, T. (2016). Binary Encryption Based On a Rubik's Cube.
Diyachenko, T. (2015). STATISTICAL ANALYSIS OF THE UNIFORMITY. CENTRIA
UNIVERSITY OF APPLIED SCIENCES.
Harding, L. (2014). The Snowden Files The Inside Story of the Most Wanted Man. London:
Guardian Books.
IONESCU, V. M., & DIACONU, A. V. (2015). Rubik's cube principle based image
encryption algorithm implementation on mobile device. Electronics,Computers and
Aritificial Intelligence (ECAI), 2015 - International Conference – 7th Edition.
K.A, A., & Bharathan, P. K. (2015). Secure Communication Based on Rubik's Cube
Algorithm And Chaotic Baker Map. International Conference on Emerging Trends
in Engineering, Science and Technology (ICETEST).
Khizrai, M. S., & Bodkhe, S. T. (2014). Image Encryption using Different Techniques for
High Security Transmission over a Network. nternational Journal of Engineering
Research and General Science vol 2, no 4.
Loukhaoukha, K., Chouinard, J.-Y., & Berdai, A. (2012). A Secure Image Encryption
Algorithm Based on the Rubik’s Cube Principle. Journal of Electrical and Computer
Engineering, vol 2012.
Nivedhitha1, R., Meyyappan, T., & Phil, M. (2012). Image Security Using Steganography
And. International Journal of Engineering Trends and Technology, vol 3, no 3.
Pakshwar, R., Trivedi, V. K., & Richhariya, V. (2013). Survey On Different Image
Encryption and Decryption Techniques. International Journal of Computer Science
and Information Technologies, vol. 4, 113-116.
Pareek, N. K. (2002). DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE
ENCRYPTION SCHEME. International Journal of Network Security & Its
Applications (IJNSA),Vol.4, No.
Implementasi Algoritma Enkripsi..., Kenny Wantara, FTI UMN, 2018
58
Patel, K. D., & Belani, S. (2011). Image Encryption Using Different Techniques: A Review.
International Journal of Emerging Technology and Advanced Engineering, vol 1, no
1, 30-34.
Rahmawati, W. M., & Dailey, N. M. (2014). Analysis Performance Of Fast Image
Encryption. Jurnal Ilmiah Teknologi Informasi, vol 12, no.2, 18-26.
Sencar, H. T., & Memon, N. (2005). Watermarking and Ownership Problem: A Revisit. DRM
'05 Proceedings of the 5th ACM workshop on Digital rights management , 93-101.
Sinha, B. (2013). Comparison of PNG & JPEG Format for LSB Steganography. International
Journal of Science and Research (IJSR) .
Stallings, W. (2011). Network Security Essentials Applications and Standards.Edisi 4. New
Jersey: Prentice Hall.
Tripathi, R., & Agrawal, S. (2014). Comparative Study of Symmetric and Asymmetric
Cryptography Techniques. International Journal of Advance Foundation and
Research in Computer (IJAFRC), vol 1 , no. 6.
Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image
encryption algorithm. Applied Soft Computing Journal, vol. 11, no. 1, 514-522.
Wu, Y., Noonan, J. P., & Agian, S. (2011). NPCR and UACI Randomness Tests for Image
Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology,
Journal of Selected Areas in Telecommunications (JSAT),.
Implementasi Algoritma Enkripsi..., Kenny Wantara, FTI UMN, 2018