Penyembunyian Pesan Pada File Audio Menerapkan Metode Chineseremainder Theorem
DOI:
https://doi.org/10.30865/resolusi.v1i6.162Keywords:
Steganography; Chineses Reminder Theorem; AudioAbstract
Information which is the result of processing from data has a different value for each person. Often information becomes very valuable and not everyone is allowed to know it, but there are always parties who try to find out information in ways that are not supposed to even intend to destroy it. There are several methods in steganography, one of which is a method to hide secret messages (text or images) in other files containing text, images, and even audio without showing any real or visible changes in the quality and structure of the original file. . These methods include invisible ink, microdots, word management, digital signatures, hidden paths and wide spectrum communications. Chineses Reminder Theorem (CRT) is a concept based on congruent relationships. However, in contrast to congruence in general, this concept is based on a simultaneous congruence relationship. Simultaneous congruence refers to several congruent relationships that have a relationship with one another, and this relationship is related to the same variable value but with different modules. This theory is an ancient theory that is often used in cryptographic applications.
Downloads
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Penyembunyian Pesan Pada File Audio Menerapkan Metode Chineseremainder Theorem
ARTICLE HISTORY
Issue
Section
Copyright (c) 2021 Josferi Pardosi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).














