Jassim, Khider Nassif and Nsai, Ahmed Khudhur and Nseaf, Asama Kuder and Hazidar, Al Hamidy and Priambodo, Bagus and Naf'an, Emil and Masril, Mardhiah and Handriani, Inge and Putra, Zico Pratama (2019) Hybrid cryptography and steganography method to embed encrypted text message within image. In: Proceedings International Conference on Computer Science and Engineering, 26 - 27 April 2019, Universitas Putra Indonesia YPTK , Padang.
Text
Hybrid cryptography and steganography method IC2SE-1.pdf Download (2MB) |
Abstract
The businesses in various fields use the online communication application to gather their data and information with local and global sources. The gathered data may sensitive such as the financial and businesses development information. The hackers or online thief try to stole the valuable data i.e. credit card numbers. The organizations looking for secure online channels in order to transfer their data efficiently and avoid the data thieving. One of the most applicable methods that developed to secure the online transferred data is the cryptography which transfers the original data or information to encrypted formulation. Cryptography still has many drawbacks such as stole and decrypts the original texts using automatic decryption counter. The main aim of this research is to improve the cryptography securing level using supportive method which is Steganography. The Steganography is the processes of hide the data or information in media files such as video, images and audio files. There are four stages represent the methodology of this paper; (1) encrypt the original texts using RSA algorithm, (2) hide the encrypted texts in Image files, (3) extract the encrypted texts from Image files, and (4) decrypt the original texts using decryption key of RSA algorithm. It is expected to improve the security level of the online transferred textual data. The performance of the final results will be evaluated through compare the Image files quality before and after hide the data in these files. The quality of the original and stego Image files need to be same or near in order to maximize the difficulty of detect that there data hide in these files.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Subjects: | 0 Research > Ilmu Komputer > Komputasi Lembut |
Divisions/ Fakultas/ Prodi: | Fakultas Ilmu Komputer |
Depositing User: | Tri Wahyuni Oktanita A.Md |
Date Deposited: | 04 Apr 2023 03:47 |
Last Modified: | 02 Oct 2023 02:18 |
URI: | http://repository.upiyptk.ac.id/id/eprint/4598 |
Actions (login required)
View Item |