Implementasi Steganografi Menggunakan Metode Least Significant Bit dan Kriptografi Advanced Encryption Standard

2012 ◽  
Vol 4 (1) ◽  
pp. 24-32
Author(s):  
Shinta Puspita Sari ◽  
Winarno Winarno ◽  
Dodick Z. Sudirman

Nowadays, the development of celluler device especially mobile phone is very rapid. The security of information in mobile phone becoming such an important thing, because users do not want other people can access their essential information. It means in the security in mobile phone. One way to secure the data is steganograpgy technique. This technique hides the data in a digital media. In this research the steganography technique that the is used is the Least Significant Bit (LSB) which implemented to cellular equipment with android as the operating system. The digital image which is used to hide the data is PNG. The test result shows that steganography has been implemented successfully in android phone. In the imprecebility aspect, user cannot different between the picture with message and the original picture bare eyedly. In recovery aspect, the message successfully encrypted and decrypted without changing the original content of the message. The lack occurs in fidelity aspect which the expansion of PNG file happens. Index Terms—LSB, least significant bit, png, android, handphone

Author(s):  
Musa. M. Yahaya ◽  
Aminat Ajibola

Recently, the rate of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business owners. Cryptography and steganography are two major key players for data security technique. Cryptography is use to perform encryption on the secrete message while steganography hides the secrete message in digital media, image in this regards. This paper employed these two techniques using Advanced Encryption Standard (AES) for the cryptography and Least Significant Bit (LSB) for the steganography. Combining the two algorithms ensured data integrity, data security, and flexibility. The changes in the secrete message carrier (Stego) is insignificant and is often not noticeable by the nicked eyes, thus this make the interception of the message often difficult by intruder.


2019 ◽  
Vol 17 (71) ◽  
pp. 1-12
Author(s):  
Naseef Husam Mohammad ◽  
Ahmed Abdul-latief Mohammed

This paper, will overview the use of data hiding techniques in JPEG digital image file format. In particular, will describe how one can use Steganography to hide information in a JPEG digital image. This research will review of hiding data by using Least Significant Bit (LSB) as a method, and hiding a text (document) in a JPEG image as a media cover. This paper was implemented by using matlab to complete hiding data. Data hiding is a technique that is used to embed secret information into a cover media. However, the transmitted images may be compressed or not. When it is transmitted, an errors transmitting may occur. If such errors occurred, the receiver cannot extract the information correctly from the cover_image. Digital media have been massively produced, easily manipulated, and swiftly transmitted to almost anywhere in the world at anytime.


2018 ◽  
Vol 26 (8) ◽  
pp. 112-121
Author(s):  
Aymen Mudheher Badr ◽  
Mohamed layth Talal ◽  
Ghassan Sabeh

Because the big grown of the digital market and the growing demand for protection to data and information which transmitted through the Internet. Steganography is the art of embedding, hiding information into different digital media, it was the main reason to increase its importance in the exponential development of the secret communication of computer and digital cloud users over the internet. There are a lot of techniques and different ways to achieve hiding data. Usually, the data embedding is obtained in communication such as image, text, voice or any multimedia content for copyright and also in military communication for authentication and many other different purposes. In this paper, we protected the information in two ways: Encryption and Steganography. The basic idea is to present a method that encrypted the message firstly by using The AES (Advanced Encryption Standard) it is a symmetric-key encryption each of these ciphers it has 128-bit the size to block, and size keys of 128, 192 and 256 bits.  Secondly, hide that encrypted message in color cover image in the Least Significant Bit (LSB) to image’s frame with (.bmp, .jpg) extensions. Our scheme is to enhance the ability of LSB algorithm to include the storage of information and images encoded and intangible sense of human vision. That two methods to increased together the security attend any attack.


2016 ◽  
Vol 7 (1) ◽  
pp. 1-4
Author(s):  
M. Chaeril Maricar ◽  
Seng Hansun

Securing data during transmission become one of the problem in technology, those data can be intercepted and read by others. One preventive action to overcome this is by using steganography. This thesis implements an audio steganography using Windows Phone. Combination of Advanced Encryption Standard to secure data and Audio Wave Steganography which embedded data inside 4th LSB layer, resulting in increased safety and robustness against noise addition compared to 1st LSB. Index Terms—Advanced Encryption Standard, Audio Steganography, Audio Wave Steganography, Least Significant Bit, Windows Phone.


2013 ◽  
Vol 4 (2) ◽  
pp. 79-83
Author(s):  
Handy Sunjaya ◽  
Deny Setiawan ◽  
Sandri Pratama

In this project, we demonstrated how to improve transfer rate when transfering data from a notebook installed FreeBSD operating system to another notebook installed Windows 8 operating system. The method which we used was with customizing the kernel on FreeBSD. Before we customized the kernel, we calculated the average time of the transfer speed with its default kernel. After we got the average time, then we customized its kernel and calculated the average time after we installed the custom kernel. At the end we got faster average time with the customized kernel and the performance better. Index Terms - FreeBSD, Server, Transfer rate, Improving


2014 ◽  
Vol 6 (1) ◽  
pp. 15-20 ◽  
Author(s):  
David Hartanto Kamagi ◽  
Seng Hansun

Graduation Information is important for Universitas Multimedia Nusantara  which engaged in education. The data of graduated students from each academic year is an important part as a source of information to make a decision for BAAK (Bureau of Academic and Student Administration). With this information, a prediction can be made for students who are still active whether they can graduate on time, fast, late or drop out with the implementation of data mining. The purpose of this study is to make a prediction of students’ graduation with C4.5 algorithm as a reference for making policies and actions of academic fields (BAAK) in reducing students who graduated late and did not pass. From the research, the category of IPS semester one to semester six, gender, origin of high school, and number of credits, can predict the graduation of students with conditions quickly pass, pass on time, pass late and drop out, using data mining with C4.5 algorithm. Category of semester six is the highly influential on the predicted outcome of graduation. With the application test result, accuracy of the graduation prediction acquired is 87.5%. Index Terms-Data mining, C4.5 algorithm, Universitas Multimedia Nusantara, prediction.


2021 ◽  
Vol 6 (1) ◽  
Author(s):  
Fayyad Kazan H

In the context of forensic investigations, the traditional understanding of evidence is changing nowadays where most prosecutors, lawyers and judges heavily rely on multimedia substantiations. However, the evolution of easy-to-use media manipulating tools, made it very easy for almost any (technical) person to alter the content of a digital media (e.g. digital image, audio or video) without leaving any traces that can be detectable by human's basic perceptions. Therefore, the validity of the digital media can no longer be guaranteed which in turn leads to a serious problem regarding digital crime investigation. As there are tools which can tamper media, there are also ones that can do the reverse: detect the tampering. This paper sheds the light on the available anti-forensics tools. Experiments were done using some of these tools to detect tampered media – more specifically video tampering. Our experiments showed the efficiency of these tools by differentiating between original and altered evidences.


Author(s):  
Ritu Sharma

Technology is being used and improved by human beings over a long period of time now and Smartphones is one of them. Smart Phones contain touch screen, built in keyboard, high resolution camera, front side camera for video conferencing, etc. They are used for making and receiving calls, sending and receiving messages, accessing the Internet, digital media, incorporating audio/video recording etc. Different smart phones have different operating systems and mobile applications are developed for each operating system in smart phones, tablet or mobile phones, in order to serve the needs of the user. These apps are either preinstalled or downloadable from online app market that can do almost everything. Apps make a mobile be like a portable computer having multi core processors, gigabytes of memory and a real operating system. Originally mobile apps were made available for only calling, messaging and informational purposes like calendar, weather forecast, e- mail, etc. With improvement in technology and increase in user demands, developers started making apps for other purposes like games, banking, video chats etc. Some apps are also used to present data in the same format as on a computer website and also allow you to download content that you can use when there is no Internet. There are many apps available in market today for different Operating Systems in which Android is having the maximum market share these days.


Author(s):  
Dakhaz Mustafa Abdullah ◽  
Siddeeq Y. Ameen ◽  
Naaman Omar ◽  
Azar Abid Salih ◽  
Dindar Mikaeel Ahmed ◽  
...  

Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire focus on secure transmitting secret information. Confidential information is collectively referred to as Steganography for inconspicuous digital media such as video, audio, and images. In disguising information, Steganography plays a significant role. Traditional Steganography faces a further concern of discovery as steganalysis develops. The safety of present steganographic technologies thus has to be improved. In this research, some of the techniques that have been used to hide information inside images have been reviewed. According to the hiding domain, these techniques can be divided into two main parts: The spatial Domain and Transform Domain. In this paper, three methods for each Domain have been chosen to be studied and evaluated. These are; Least Significant Bit (LSB), Pixel Value Difference (PVD), Exploiting Modification Direction (EMD), contourlet transform, Discrete Wavelet Transformation (DWT), and, Discrete Cosine Transformation (DCT). Finally, the best results that have been obtained in terms of higher PSNR, Capacity, and more robustness and security are discussed.


2020 ◽  
Vol 189 ◽  
pp. 03013
Author(s):  
Shan Li

In the context of the development of digital image era and digital media art, watercolor art, as a traditional form of painting, will inevitably experience a subversive change and transformation of painting methods and ideas. By analyzing the artistic expression and construction process of watercolor art in digital painting, this paper finds out the aesthetic value and significance of watercolor art in digital painting, discusses the relationship between traditional watercolor painting and digital painting and the new space of watercolor development in the future.


Sign in / Sign up

Export Citation Format

Share Document