Please use this identifier to cite or link to this item: http://repository.ipb.ac.id/handle/123456789/60018
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorNeyman, Shelvie Nidya
dc.contributor.authorHaryanto
dc.date.accessioned2013-01-30T02:24:30Z
dc.date.available2013-01-30T02:24:30Z
dc.date.issued2009
dc.identifier.urihttp://repository.ipb.ac.id/handle/123456789/60018
dc.description.abstractVisual cryptography was introduced in 1995 by Moni Naor and Adi Shamir. From that moment visual cryptography has grown. Visual cryptography scheme has changed from the most simple technique which can be decrypted by human visual system until advanced techniques that need computer assistance on decryption process. Visual cryptography was firstly used for binary images, but now it can be used in color images. One of the methods that can be used in visual cryptography for the color image is Youmaran's method. The aim of this research is implementing visual cryptography using Youmaran's method and then analyzing it. This research uses maximum foul' cover images to hide plain image. This research uses Mersenne Twister algorithm to generate random numbers for encryption and decryption process. This research also calculates the PSNR value of the decrypted image. The result from this research indicates that using visual cryptography with Youmaran's method can hide an image in other images. With this method, human eye will not know that in fact there is an image inside the camouflage images.en
dc.subjectBogor Agricultural University (IPB)en
dc.subjectPSNRen
dc.subjectMersenne Twisteren
dc.subjectYoumaranen
dc.subjectVisual Cryptographyen
dc.titleImplementasi Kriptografi Visual pada Citra Berwarna Menggunakan Metode Youmaranen
Appears in Collections:UT - Computer Science

Files in This Item:
File Description SizeFormat 
Abstract.pdf
  Restricted Access
Abstract298.01 kBAdobe PDFView/Open
BAB I Pendahuluan.pdf
  Restricted Access
BAB I339.16 kBAdobe PDFView/Open
BAB II Tinjauan Pustaka.pdf
  Restricted Access
BAB II538.13 kBAdobe PDFView/Open
BAB III Metode Penelitian.pdf
  Restricted Access
BAB III629.23 kBAdobe PDFView/Open
BAB IV Hasil dan Pembahasan.pdf
  Restricted Access
BAB IV673.12 kBAdobe PDFView/Open
BAB V Kesimpulan dan Saran.pdf
  Restricted Access
BAB V379.48 kBAdobe PDFView/Open
Cover.pdf
  Restricted Access
Cover291.4 kBAdobe PDFView/Open
Daftar Pustaka.pdf
  Restricted Access
Daftar Pustaka314.6 kBAdobe PDFView/Open
G09har.pdf
  Restricted Access
full text2.84 MBAdobe PDFView/Open
Lampiran.pdf
  Restricted Access
Lampiran1.85 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.