scholarly journals The implementation of trithemius algorithm and modified least significant bit (mlsb) blue channel for bitmap image security

2019 ◽  
Vol 1235 ◽  
pp. 012079
Author(s):  
S M Hardi ◽  
D Rachmawati ◽  
A Wulandari ◽  
I Jaya ◽  
J T Tarigan
2019 ◽  
Vol 5 (3) ◽  
pp. 261
Author(s):  
Yahya Risqi ◽  
Rudy Dwi Nyoto ◽  
Hafiz Muhardi

Image Steganography adalah teknik untuk menyisipkan pesan rahasia ke dalam suatu citra digital, sehingga secara kasat mata manusia tidak akan mengetahui keberadaan dari pesan rahasia tersebut. Tujuan dari penetilian ini adalah menggunakan citra QR Code sebagai secret yang diubah ke dalam mode bitonal dengan 1 bit pada tiap pikselnya kemudian dipecah menjadi dua bagian dan disisipkan kedalam blue channel di dual carrier image sehingga kapasitas dari pesan yang akan disisipkan dapat meningkat. Penyisipan pada dual carrier image juga dapat meningkatkan keamanan karena pesan dapat dikirim secara terpisah. Penyisipan pesan dilakukan dengan metode substitusi Least Significant Bit (LSB). Untuk mengevaluasi model steganography yang diteliti, digunakan pengujian MSE and PSNR, Hiding Capacity (HC), Histogram, recovery dan noise. Hasil pengujian menunjukkan dengan menggunakan citra PNG dan TIFF pada HC hingga 95% nilai PSNR tetap tinggi yaitu sebesar 56 dB, dengan tingkat recovery 100% dan tahan terhadap jenis noise salt and pepper.


2018 ◽  
Vol 18 (2) ◽  
pp. 91
Author(s):  
Melinda Asti ◽  
Ahmad Kamsyakawuni ◽  
Kiswara Agung Santoso

Cryptography is knowledge of encoding data to ensure the confidentiality, security, validity and integrity of data. Cryptography is divided into two namely classical cryptography and modern cryptography. One example of modern cryptography is the Electronic Code Book (ECB). Electronic Code Book (ECB) is a modern cryptographic method used to encrypt and decrypt text, images and more. The image is formed from several pixels which consist of several bits in a pixel. Bits are divided into two namely Least Significant Bit (LSB) and Most Significant Bit (MSB).LSB is the four rightmost bits while MSB is the leftmost four bits of a pixel. The purpose of this study is to compare the level of security of Electronic Code Book (ECB) image security results with the results of securing an Electronic Code Book (ECB) modified image. The data used in this study are 8 RGB and Greyscale images also a key in the form of one ASCII character. The results obtained show that securing images with modified Electronic Code Book (ECB) is safer than securing images with Electronic Code Book (ECB) based on histogram analysis, differential analysis and correlation coefficients. Keywords: ASCII, Electronic Code Book (ECB), Most Significant Bit (MSB)


Author(s):  
Hristo Terziev

Internet of Things is a new world for connecting object space in the real world with virtual space in a computer environment. To build IoT as an effective service platform, end users need to trust the system. With the growing quantity of information and communication technologies, the need to ensure information security and improve data security is increasing. One of the potential solutions for this are steganographic methods. Steganography based on the least significant bit (LSB) is a popular and widely used method in the spatial domain.


Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Author(s):  
Ellya Helmud

ABSTRAK Keamanan dan kerahasiaan suatu pesan merupakan hal yang harus dijaga. Kebutuhan untuk menjaga keamanan pesan dan menjaga kerahasiaan pesan dibutuhkan dua metode yang berbeda, dimana untuk menjaga keamanan pesan digunakan kriptografi dan untuk menjaga kerahasiaan pesan digunakan steganografi. Pada penelitian ini, penulis mengkombinasikan kriptografi dan steganografi untuk menjaga keamanan dan kerahasiaan pesan. Kriptografi yang digunakan menggunakan algoritma RC4 dan steganografi yang digunakan menggunakan metode Least Significant Bit (LSB). Pada penelitian ini pengujian dilakukan dengan perangkat lunak Visual Studio 2008 dan untuk hasil gambar yang dihasilkan diuji menggunakan Matlab R2015b. Pengujian waktu pada proses enkripsi dan dekripsi menggunakan algoritma RC4 dilakukan sebanyak 10 kali dari jumlah karakter 100 hingga 1000 karakter, kemudian gambar yang dihasilkan mempunyai nilai error dan nilai kualitas yang tidak jauh berbeda. Kata Kunci: Kriptografi, Steganografi, LSB, RC4


2020 ◽  
Vol 167 ◽  
pp. 1291-1299
Author(s):  
P. Karthika ◽  
R. Ganesh Babu ◽  
K. Jayaram

Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 510
Author(s):  
Taiyong Li ◽  
Duzhong Zhang

Image security is a hot topic in the era of Internet and big data. Hyperchaotic image encryption, which can effectively prevent unauthorized users from accessing image content, has become more and more popular in the community of image security. In general, such approaches conduct encryption on pixel-level, bit-level, DNA-level data or their combinations, lacking diversity of processed data levels and limiting security. This paper proposes a novel hyperchaotic image encryption scheme via multiple bit permutation and diffusion, namely MBPD, to cope with this issue. Specifically, a four-dimensional hyperchaotic system with three positive Lyapunov exponents is firstly proposed. Second, a hyperchaotic sequence is generated from the proposed hyperchaotic system for consequent encryption operations. Third, multiple bit permutation and diffusion (permutation and/or diffusion can be conducted with 1–8 or more bits) determined by the hyperchaotic sequence is designed. Finally, the proposed MBPD is applied to image encryption. We conduct extensive experiments on a couple of public test images to validate the proposed MBPD. The results verify that the MBPD can effectively resist different types of attacks and has better performance than the compared popular encryption methods.


Sign in / Sign up

Export Citation Format

Share Document