Proteksi Keamanan Data pada Quick Response (QR) Code

Main Article Content

Abdur Rahman Harits Martawireja
Ridwan Ridwan
Angga Putra Hafidzin
Muhammad Taufik


The implementation of Quick Response (QR) Code to share or store information increased widely. QR code can quickly provide a data or information such as contact person, plain text, URLs or other data by scan a QR code using smartphone camera. The raised of QR code implementation must to be follow by a level of data security. In this journal we will discuss a number of processes that can be used to improve data security in QR codes. In computer science there are several terms related to data protection i.e. Cryptography and Steganography. Cryptography focuses on securing information in the data exchange process. Steganography is a process of hiding information into an object that cannot be detected by anyone without a steganographic key. With these two processes i.e. cryptography and steganography or a combination of both, the data embedded in the QR code will not be easy to translate. The method that will be discussed is Speck Algorithm encryption and Advanced Encryption Standard (AES) with a combination of Steganography. Both methods succeed in converting confidential information into data that is not easily recognized. Confidential information that goes through a steganographic process becomes difficult to detect and gives the wrong message to a third party.


Download data is not yet available.

Article Details

How to Cite
Martawireja, A. R. H., Ridwan, R., Hafidzin, A. P., & Taufik, M. (2021). Proteksi Keamanan Data pada Quick Response (QR) Code. Jurnal Teknologi Dan Rekayasa Manufaktur , 3(2), 99-110.


M. Shanthi dan R. Euphrasia, “Data Security Through QR Code Encryption and Steganography,” dalam Advanced Computing: An International Journal (ACIJ), 2016.
M. Alajmi, I. Elashry dan H. El-Sayed, “Steganography of Encrypted Messages Inside Valid QR Codes,” dalam IEEE Access, 2020.
G. Baralla, A. Pinna dan G. Corrias, “Ensure Traceability in European Food Supply Chain by Using a Blockchain System,” dalam IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), 2019.
M. Barakat, C. Eder dan T. Hanke, An Introduction to Cryptography, Univesity of Kaiserslautern, 2018.
A. Toumazis, “Steganography,” 2009.
M. Kharrazi, H. Sencar dan N. Memon, “Image Steganography: Concepts and Practice,” dalam Research Gate, 2004.
Ariadi, “Analisis dan Perancangan Kode Matriks Dua Dimensi Quick Response (QR) Code,” 2011.
M. Umaria dan Jethava, “Enhancing the data storage Capacity in QR code using Compression Algorithm and achieving security and Further data storage capacity improvement using Multiplexing,” dalam International Conference on Computational Intelligence and Communication Networks, 2015.
R. Syahdan dan E. Anitasari, “Penggunaan QR Code dengan Enkripsi Vigenere Cipher dalam Pengamanan Data,” dalam SEMINAR MATEMATIKA DAN PENDIDIKAN MATEMATIKA UNY, 2017.
C. Irawan, “Enkripsi Pada QR Code Tiket Dengan RSA,” dalam Institut Teknologi Bandung, Makalah IF Kriptografi, 2010.
P. A. Wicaksono, “Enkripsi Menggunakan Algoritma RSA,” dalam Institut Teknologi Bandung, Bandung.
M. Rinaldi, “Kriptografi : Steganografi dan Watermarking,” 2004.
A. D, “Keamanan Multimedia,” 2009.
E. Firmanesa dan Wildan, “Uji SAC Terhadap Algoritma Speck,” 2016.
A. Y. Poschmann, “Lightwight Cryptography,” dalam Unievrsity Bochum, Bochum, 2009.
Y. S. Fatmala, A. Kusyanti dan M. Data, “Implementasi Algoritme Speck untuk Enkripsi dan Dekripsi pada QR Code,” dalam Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, 2018.
M. Rouse, “Search Security,” April 2020. [Online]. [Diakses 10 May 2020].
Z. Muttaqin, “Pembuatan Aplikasi Enkripsi Menggunakan Metode Advance Encryption Standard dan Rivest Shamir Adlemen,” 2019.