Lisensi ini mengizinkan setiap orang untuk menggubah ...kc.umn.ac.id/5057/5/DAFTAR PUSTAKA.pdf ·...

3
Team project ©2017 Dony Pratidana S. Hum | Bima Agus Setyawan S. IIP Hak cipta dan penggunaan kembali: Lisensi ini mengizinkan setiap orang untuk menggubah, memperbaiki, dan membuat ciptaan turunan bukan untuk kepentingan komersial, selama anda mencantumkan nama penulis dan melisensikan ciptaan turunan dengan syarat yang serupa dengan ciptaan asli. Copyright and reuse: This license lets you remix, tweak, and build upon work non-commercially, as long as you credit the origin creator and license it on your new creations under the identical terms.

Transcript of Lisensi ini mengizinkan setiap orang untuk menggubah ...kc.umn.ac.id/5057/5/DAFTAR PUSTAKA.pdf ·...

Page 1: Lisensi ini mengizinkan setiap orang untuk menggubah ...kc.umn.ac.id/5057/5/DAFTAR PUSTAKA.pdf · Rubik's cube principle based image encryption algorithm implementation on mobile

Team project ©2017 Dony Pratidana S. Hum | Bima Agus Setyawan S. IIP 

 

 

 

 

 

Hak cipta dan penggunaan kembali:

Lisensi ini mengizinkan setiap orang untuk menggubah, memperbaiki, dan membuat ciptaan turunan bukan untuk kepentingan komersial, selama anda mencantumkan nama penulis dan melisensikan ciptaan turunan dengan syarat yang serupa dengan ciptaan asli.

Copyright and reuse:

This license lets you remix, tweak, and build upon work non-commercially, as long as you credit the origin creator and license it on your new creations under the identical terms.

Page 2: Lisensi ini mengizinkan setiap orang untuk menggubah ...kc.umn.ac.id/5057/5/DAFTAR PUSTAKA.pdf · Rubik's cube principle based image encryption algorithm implementation on mobile

DAFTAR PUSTAKA

Asuni, N., & Giachetti, A. (2015). TESTIMAGES: A Large Data Archive For Display and

Algorithm Testing. Journal of Graphics Tools, Volume 17, Issue 4, 113-125.

Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on

3D chaotic cat maps. Chaos, Solitons and Fractals, vol. 21, no. 3, 749-761.

Chhabra, V., & Sundaram, T. (2016). Binary Encryption Based On a Rubik's Cube.

Diyachenko, T. (2015). STATISTICAL ANALYSIS OF THE UNIFORMITY. CENTRIA

UNIVERSITY OF APPLIED SCIENCES.

Harding, L. (2014). The Snowden Files The Inside Story of the Most Wanted Man. London:

Guardian Books.

IONESCU, V. M., & DIACONU, A. V. (2015). Rubik's cube principle based image

encryption algorithm implementation on mobile device. Electronics,Computers and

Aritificial Intelligence (ECAI), 2015 - International Conference – 7th Edition.

K.A, A., & Bharathan, P. K. (2015). Secure Communication Based on Rubik's Cube

Algorithm And Chaotic Baker Map. International Conference on Emerging Trends

in Engineering, Science and Technology (ICETEST).

Khizrai, M. S., & Bodkhe, S. T. (2014). Image Encryption using Different Techniques for

High Security Transmission over a Network. nternational Journal of Engineering

Research and General Science vol 2, no 4.

Loukhaoukha, K., Chouinard, J.-Y., & Berdai, A. (2012). A Secure Image Encryption

Algorithm Based on the Rubik’s Cube Principle. Journal of Electrical and Computer

Engineering, vol 2012.

Nivedhitha1, R., Meyyappan, T., & Phil, M. (2012). Image Security Using Steganography

And. International Journal of Engineering Trends and Technology, vol 3, no 3.

Pakshwar, R., Trivedi, V. K., & Richhariya, V. (2013). Survey On Different Image

Encryption and Decryption Techniques. International Journal of Computer Science

and Information Technologies, vol. 4, 113-116.

Pareek, N. K. (2002). DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE

ENCRYPTION SCHEME. International Journal of Network Security & Its

Applications (IJNSA),Vol.4, No.

Implementasi Algoritma Enkripsi..., Kenny Wantara, FTI UMN, 2018

Page 3: Lisensi ini mengizinkan setiap orang untuk menggubah ...kc.umn.ac.id/5057/5/DAFTAR PUSTAKA.pdf · Rubik's cube principle based image encryption algorithm implementation on mobile

58

Patel, K. D., & Belani, S. (2011). Image Encryption Using Different Techniques: A Review.

International Journal of Emerging Technology and Advanced Engineering, vol 1, no

1, 30-34.

Rahmawati, W. M., & Dailey, N. M. (2014). Analysis Performance Of Fast Image

Encryption. Jurnal Ilmiah Teknologi Informasi, vol 12, no.2, 18-26.

Sencar, H. T., & Memon, N. (2005). Watermarking and Ownership Problem: A Revisit. DRM

'05 Proceedings of the 5th ACM workshop on Digital rights management , 93-101.

Sinha, B. (2013). Comparison of PNG & JPEG Format for LSB Steganography. International

Journal of Science and Research (IJSR) .

Stallings, W. (2011). Network Security Essentials Applications and Standards.Edisi 4. New

Jersey: Prentice Hall.

Tripathi, R., & Agrawal, S. (2014). Comparative Study of Symmetric and Asymmetric

Cryptography Techniques. International Journal of Advance Foundation and

Research in Computer (IJAFRC), vol 1 , no. 6.

Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image

encryption algorithm. Applied Soft Computing Journal, vol. 11, no. 1, 514-522.

Wu, Y., Noonan, J. P., & Agian, S. (2011). NPCR and UACI Randomness Tests for Image

Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology,

Journal of Selected Areas in Telecommunications (JSAT),.

Implementasi Algoritma Enkripsi..., Kenny Wantara, FTI UMN, 2018