[1] H. Hendy and H. Akbar, “Pengembangan Aplikasi Android Belajar Kriptografi Sebagai Media Pembelajaran Mata Kuliah Kriptografi,” J. Inform., vol. 8, no. 1, pp. 17–25, 2021, doi: 10.31294/ji.v8i1.9420.
[2] J. Simarmata et al., Sistem Keamanan Data. 2022.
[3] A. A. Permana, “Aplikasi Penyisipan Teks pada Gambar Dengan Algoritma Blowfish dan Least Significant Bit,” J. Tek. Inform., vol. 59, pp. 11–17, 2017.
[4] R. Rizki and S. Mulyati, “Implementasi One Time Password Menggunakan Algoritma SHA-512 Pada Aplikasi Penagihan Hutang PT. XHT,” Edumatic J. Pendidik. Inform., vol. 4, no. 1, pp. 111–120, 2020, doi: 10.29408/edumatic.v4i1.2158.
[5] H. Alabdulrazzaq and M. N. Alenezi, “Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish,” Int. J. Commun. Networks Inf. Secur., vol. 14, no. 1, pp. 51–61, 2022, doi: 10.54039/ijcnis.v14i1.5262.
[6] A. M. Qadir and N. Varol, “A review paper on cryptography,” 7th Int. Symp. Digit. Forensics Secur. ISDFS 2019, no. October, pp. 1–6, 2019, doi: 10.1109/ISDFS.2019.8757514.
[7] I. F. Ashari, “Graph Steganography Based On Multimedia Cover To Improve Security and Capacity,” in 2018 International Conference on Applied Information Technology and Innovation (ICAITI), 2018, no. April 2019, pp. 194–201.
[8] I. F. Ashari, A. W. Bhagaskara, J. M. Cakrawarty, and P. R. Winata, “Image Steganography Analysis Using GOST Algorithm and PRNG Based on LSB,” Techno.Com, vol. 21, no. 3, pp. 700–713, 2022, doi: 10.33633/tc.v21i3.6331.
[9] I. F. Ashari, “The Evaluation of Audio Steganography to Embed Image Files Using Encryption and Snappy Compression,” Indones. J. Comput. Sci., vol. 11, no. 2, pp. 318–336, 2022.
[10] Y. Ramesh and K. K. Reddi, “RK algorithm: stochastic parallel methodology for symmetric key cryptography,” APTIKOM J. Comput. Sci. Inf. Technol., vol. 2, no. 3, pp. 137–144, 2020, doi: 10.34306/csit.v2i3.73.
[11] T. H. Saputro, N. H. Hidayati, and E. I. H. Ujianto, “Survei Tentang Algoritma Kriptografi Asimetris,” J. Inform. Polinema, vol. 6, no. 2, pp. 67–72, 2020, doi: 10.33795/jip.v6i2.345.
[12] I. F. Ashari, I. R. Siwi, H. Londata, and I. Wicaksono, “Steganographic Analysis of Audio and Image Media Using Lsb and Rc4 Algorithms,” ELTIKOM, vol. 7, no. 1, pp. 67–78, 2023.
[13] M. Maxrizal and B. D. A. Prayanti, “Penerapan Matriks Persegi Panjang Sebagai Kunci Publik Dan Kunci Privat Pada Modifikasi Cipher Hill,” AdMathEdu J. Ilm. Pendidik. Mat. Ilmu Mat. dan Mat. Terap., vol. 7, no. 2, p. 151, 2017, doi: 10.12928/admathedu.v7i2.9156.
[14] M. Kurniawan and S. Agustini, “Algoritma Steganografi untuk Pengamanan Data Teks ke dalam Citra Digital Menggunakan XOR Sederhana,” INTEGER J. Inf. Technol., vol. 3, no. 2, pp. 63–68, 2018, doi: 10.31284/j.integer.2018.v3i2.416.
[15] A. P. Ratnasari and F. A. Dwiyanto, “Metode Steganografi Citra Digital,” Sains, Apl. Komputasi dan Teknol. Inf., vol. 2, no. 2, p. 52, 2020, doi: 10.30872/jsakti.v2i2.3300.
[16] M. Hussain, A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, and K. H. Jung, “Image steganography in spatial domain: A survey,” Signal Process. Image Commun., vol. 65, no. December 2017, pp. 46–66, 2018, doi: 10.1016/j.image.2018.03.012.
[17] A. Eko Setiawan and A. Pasaribu, “Penerapan Steganografi Pada Citra Digital Menggunakan Metode Least Significant Bit (LSB) Kombinasi RC4 Berbasis Mobile Android,” Aisyah J. Informatics Electr. Eng., vol. 2, no. 1, pp. 18–28, 2020, doi: 10.30604/jti.v2i1.27.
[18] C. Jatmoko, L. B. Handoko, C. A. Sari, and D. R. I. M. Setiadi, “Uji Performa Penyisipan Pesan Dengan Metode Lsb Dan Msb,” Din. Rekayasa, vol. 14, no. 1, pp. 47–56, 2018.
[19] P. Patil, P. Narayankar, D. G. Narayan, and S. M. Meena, “A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish,” Procedia Comput. Sci., vol. 78, no. December 2015, pp. 617–624, 2016, doi: 10.1016/j.procs.2016.02.108.
[20] D. Ravilla and C. S. R. Putta, “Enhancing the Security of MANETs using Hash Algorithms,” Procedia Comput. Sci., vol. 54, no. December 2015, pp. 196–206, 2015, doi: 10.1016/j.procs.2015.06.022.