The Application of the Blowfish Algorithm and the Least Significant Bit Method for Securing Student Transcripts

Iwan Ady Prabowo, wawan Laksito YS, Wahyudi Wahyudi

Abstract


Academic transcripts are a summary of a student's high-value achievement score and must be guaranteed in their authenticity, as well as the source from which they are issued.  It was found that some universities were using technology to falsify transcripts. An example of a university in yogyakarta's special region that falsified academic transcripts. Several diplomas from makassar have been forged so that a civil servant can pass his exam, whereas in banda aceh evidence of equipment for creating fake diplomas has been found. This study seeks to prevent transcripts from being modified or falsified by locking data into student photos using blowfish and least significant bit algorithms. The purpose of this study is to keep transcripts from being  easily  modified or falsified. The methods of this study are data collection (student code data, gpa value, photo), encryption with blowfish, conversion of encryption results into binary form, insertion of binary values into the least significant bit method into photos, capture of encryption values from least significant bit photos, and returning messages encrypted with blowfish. In this study, the results show that this system was able to secure data and enter information into student photos with an accuracy of 100% after testing on 60 transcript value data. We can conclude that the application of blowfish and least significant bit algorithms to secure data and enter data into student photos is extremely effective in transkrip value.


Keywords


Securing Student Transcripts Academic, Blowfish, Least Significant Bit

Full Text:

PDF

References


Abbas, S. Z., Ibrahim, H., & Khan, M. (2021). A hybrid chaotic blowfish encryption for high-resolution satellite imagery. Multimedia Tools and Applications, 80(17), 26069–26091. https://doi.org/10.1007/s11042-021-10898-w

Alabaichi, A., Al-Dabbas, M. A. A. K., & Salih, A. (2020). Image steganography using least significant bit and secret map techniques. International Journal of Electrical and Computer Engineering (IJECE), 10(1), 935. https://doi.org/10.11591/ijece.v10i1.pp935-946

Althaf, S. (2017). Implementasi Keamanan Data Menggunakan Algoritma Blowfish Pada Sistem Informasi Koperasi Rias. Simetris: Jurnal Teknik Mesin, Elektro Dan Ilmu …. http://jurnal.umk.ac.id/index.php/simet/article/view/952

Ariyus, D. (2008). Pengantar ilmu kriptografi: teori analisis & implementasi. books.google.com. https://books.google.com/books?hl=en&lr=&id=3SSTJONEmX0C&oi=fnd&pg=PA49&dq=pengantar+ilmu+kriptografi+teori+analisis+dan+implementasi&ots=ujGEwhiGry&sig=4pWJmW8XUUt1C7qVSM8C5jIfuMg

Azis, Y. A. (2021, December 13). Transkrip Nilai Kuliah: Pengertian, Fungsi dan Contoh. Penerbitbukudeepublish.Com. https://penerbitbukudeepublish.com/transkrip-nilai/

Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752. https://doi.org/https://doi.org/10.1016/j.sigpro.2009.08.010

Deeba, F., Kun, S., Dharejo, F. A., & Memon, H. (2020). Digital image watermarking based on ANN and least significant bit. Information Security Journal: A Global Perspective, 29(1), 30–39. https://doi.org/10.1080/19393555.2020.1717684

Hamzah, A., GA, I. B., & Raharjo, S. (2013). Penerapan Digital Signature Pada Transkrip Nilai Sebagai Otentikasi Data. Jurnal Jarkom, 1(1), 29–36.

Hendrawaty, H., Azhar, A., & Atthariq, A. (2016). Implementasi Algoritma RSA dan QR Code Untuk Keamanan Transkrip Nilai di Politeknik Negeri Lhokseumawe. Jurnal Infomedia: Teknik …. http://e-jurnal.pnl.ac.id/infomedia/article/view/331

Ilasariya, S., Patel, P., Patel, V., & Gharat, S. (2022). Image Steganography Using Blowfish Algorithm and Transmission via Apache Kafka. 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), 1320–1325. https://doi.org/10.1109/ICSSIT53264.2022.9716292

Islamadina, R., Baihaqi, B., & Sulistriadi, M. (2019). Analisa Steganografi untuk Citra Bewarna (RGB) Menggunakan Metode Less Significant Bit (LSB). Jurnal Nasional Komputasi Dan Teknologi Informasi (JNKTI), 2(1), 55. https://doi.org/10.32672/jnkti.v2i1.1058

Keswara, R. (2014, January 10). Marak pemalsuan transkip nilai PTS. Www.Sindonews.Com. https://daerah.sindonews.com/berita/825247/22/marak-pemalsuan-transkip-nilai-pts

Krisnawati, K. (2015). Metode Least Significant Bit (Lsb) Dan End of File (Eof) Untuk Menyisipkan Teks Ke Dalam Citra Grayscale. Seminar Nasional Informatika (SEMNASIF). http://103.23.20.161/index.php/semnasif/article/view/698

Mardira, S. (2015). Polisi Bongkar Sindikat Pemalsu Ratusan Ijazah Unsyiah. Www.News.Okezone.Com. https://news.okezone.com/read/2015/06/11/340/1163572/polisi-bongkar-sindikat-pemalsu-ratusan-ijazah-unsyiah

Pabbi, A., Malhotra, R., & Manikandan, K. (2021). Implementation of Least Significant Bit Image Steganography with Advanced Encryption Standard. 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), 363–366. https://doi.org/10.1109/ESCI50559.2021.9396884

Pandapotan, T. S. (2016). Analisa Perbandingan Least Significant Bit (LSB) Dan End Of File (EOF) Untuk Steganografi Citra Digital Menggunakan Matlab. In Jurnal INFOTEK (Vol. 1, Issue 3). www.stmik-budidarma.ac.id

Prabowo, I. A. (2022). BAB 2 Pencatatan dan Penyimpanan Informasi Database. Pengantar Teknologi Informasi. https://books.google.com/books?hl=en&lr=&id=PspuEAAAQBAJ&oi=fnd&pg=PA18&dq=iwan+ady+prabowo&ots=WZ3-TNhq2I&sig=cAD299BDK-jfAtx0fwhiWBvc7PM

Retno, S., & Hasdyna, N. (2018). Analisis Kinerja Algoritma Honey Encryption dan Algoritma Blowfish Pada Proses Enkripsi Dan Dekripsi. TECHSI-Jurnal Teknik Informatika. https://ojs.unimal.ac.id/techsi/article/view/858

Saddam, M. J., Ibrahim, A. A., & ... (2020). A lightweight image encryption and blowfish decryption for the secure internet of things. 2020 4th International …. https://ieeexplore.ieee.org/abstract/document/9254366/

Simanullang, H. G., & Silalahi, A. P. (2018). Algoritma Blowfish Untuk Meningkatkan Keamanan database Mysql. METHODIKA: Jurnal Teknik …. https://ejurnal.methodist.ac.id/index.php/methodika/article/download/58/47

Siregar, K. P., & Ariwibowo, E. (2014). Implementasi Keamanan Data Menggunakan Algoritma Blowfish dan LSB Pada Citra. Jurnal Sarjana Teknik …. https://garuda.kemdikbud.go.id/documents/detail/1872221

Sitinjak, S., Fauziah, Y., & Juwairiah, J. (2015). Aplikasi Kriptografi File Menggunakan Algoritma Blowfish. Seminar Nasional Informatika …. http://103.23.20.161/index.php/semnasif/article/view/1174

Sofyan, D. ; K., Elfany ; Elisa, Fanny ; Sinaga, Fathan Ghifari ; Girsang, Ken ; Mesya, & M. ; Amjad, M. (2014, December 12). UNM Usut Pembuat Ijazah Palsu. Https://Www.Jpnn.Com. https://www.jpnn.com/news/unm-usut-pembuat-ijazah-palsu

Zulfikar, M. I., Abdillah, G., & Komarudin, A. (2019). Kriptografi untuk Keamanan Pengiriman Email Menggunakan Blowfish dan Rivest Shamir Adleman (RSA). Seminar Nasional Aplikasi Teknologi Informasi ….




DOI: http://dx.doi.org/10.30646/sinus.v20i2.622

Refbacks

  • There are currently no refbacks.


 


STMIK Sinar Nusantara

KH Samanhudi 84 - 86 Street, Laweyan Surakarta, Central Java, Indonesia
Postal Code: 57142, Phone & Fax: +62 271 716 500 

Email: ejurnal @ sinus.ac.id | https://p3m.sinus.ac.id/jurnal/e-jurnal_SINUS/

ISSN: 1693-1173 (print) | 2548-4028 (online)


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

View My Stats