Enhanced pixel value differencing with cryptography algorithm

research
  • 09 Jun
  • 2020

Enhanced pixel value differencing with cryptography algorithm

The combination of Steganography and cryptography algorithms can improve the security of data you want to keep secret. Pixel Value Differencing (PVD) algorithm combined with Word Auto Key Encryption (WAKE) algorithm and Modular Multiplication Block Cipher algorithm can produce good ciphertext and inserted on image media by using PVD algorithm that convert each ciphertext into pixel.

Unduhan

 

REFERENSI

1. M. Attaran and I. VanLaar, “Privacy and security on the Internet: how to secure your personal information and company data,” Inf. Manag. Comput. Secur., vol. 7, no. 5, pp. 241–247, (1999)

2. S. Hawkins, D. C. Yen, and D. C. Chou, “Awareness and challenges of Internet security,” Inf. Manag. Comput. Secur., vol. 8, no. 3, pp. 131–143, (2000)

3. R. Rahim, D. Hartama, H. Nurdiyanto, A. S. Ahmar, D. Abdullah, and D. Napitupulu, “Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm,” J. Phys. Conf. Ser., vol. 954, no. 1, p. 12008, (2018)

4. R. Rahim, I. Zulkarnain, and H. Jaya, “Double hashing technique in closed hashing search process,” IOP Conf. Ser. Mater. Sci. Eng., vol. 237, no. 1, p. 12027, Sep. (2017)

5. H. Nurdiyanto, R. Rahim, and N. Wulan, “Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement,” J. Phys. Conf. Ser., vol. 930, no. 1, p. 12005, Dec. (2017)

6. H. Nurdiyanto and R. Rahim, “Enhanced pixel value differencing steganography with government standard algorithm,” in 2017 3rd International Conference on Science in Information Technology (ICSITech), pp. 366–371. (2017)

7. A. Putera, U. Siahaan, and R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,” Int. J. Secur. Its Appl., vol. 10, no. 8, pp. 173–180, Aug. (2016)

8. R. Rahim et al., “Combination Base64 Algorithm and EOF Technique for Steganography,” J. Phys. Conf. Ser., vol. 1007, no. 1, p. 12003, Apr. (2018)

9. P. M. Vidhya and V. Paul, “A method for text steganography using malayalam text,” in Procedia Computer Science, vol. 46, pp. 524–531. (2015)

10. E. Kartikadarma, T. Listyorini, and R. Rahim, “An Android mobile RC4 simulation for education,” World Trans. Eng. Technol. Educ., vol. 16, no. 1, pp. 75–79, (2018)

11. R. Rahim et al., “Searching Process with Raita Algorithm and its Application,” J. Phys. Conf. Ser., vol. 1007, no. 1, p. 12004, Apr. (2018)

12. H. Li and P. Liu, “An Identification System Combined with Fingerprint and Cryptography,” in First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS’06), pp. 105–108. (2006)

13. R. Rahim and A. Ikhwan, “Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher,” Int. J. Sci. Res. Sci. Technol., vol. 2, no. 6, pp. 71–78, (2016)

14. W. Luo, F. Huang, and J. Huang, “A more secure steganography based on adaptive pixel-value differencing scheme,” Multimed. Tools Appl., vol. 52, no. 2–3, pp. 407–430, (2011)

15. H. Zhang, Q. Guan, and X. Zhao, “Steganography based on adaptive pixel-value differencing scheme revisited,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8389 LNCS, pp. 32–47. (2014)

16. L. Legito and R. Rahim, “SMS Encryption Using Word Auto Key Encryption,” Int. J. Recent Trends Eng. Res., vol. 3, no. 1, pp. 251–256, (2017)

17. R. Rahim and A. Ikhwan, “Study of Three Pass Protocol on Data Security,” Int. J. Sci. Res., vol. 5, no. 11, pp. 102–104, Nov. (2016)

18. H. Gultom, “Penyandian Email Menggunakan Algoritma Kriptografi WAKE( Word Auto Key Encryption),” Pelita Inform. Budi Darma, vol. 4, no. 1, pp. 107–111, (2013)