An improved security and message capacity using AES and Huffman coding on image steganography
CA Sari, G Ardiansyah… - … Electronics and Control …, 2019 - telkomnika.uad.ac.id
Abstract Information security is very important and has been widely implemented.
Cryptography and steganography are two common methods that can be implemented to …
Cryptography and steganography are two common methods that can be implemented to …
Security through blowfish and lsb bit–cycling with mathematical sequences
W Alexan, F Hemeida - 2019 Signal Processing: Algorithms …, 2019 - ieeexplore.ieee.org
Recently, lots of research work and papers are focusing on the combination of
steganography and cryptography. Steganography conceals the presence of a secret …
steganography and cryptography. Steganography conceals the presence of a secret …
Sequence-based bit-cycling in double layer message security
This paper proposes two different implementations of a double-layer message security
scheme. In both schemes, the first layer is of a cryptographic nature, employing the AES …
scheme. In both schemes, the first layer is of a cryptographic nature, employing the AES …
An imperceptible LSB image hiding on edge region using DES encryption
Sending image in a plain form has a high risk for the data being vulnerable to steal. Thus,
due to reducing the risk, data security techniques should be implemented. Data security …
due to reducing the risk, data security techniques should be implemented. Data security …
Payload enhancement on least significant bit image steganography using edge area dilation
DRIM Setiadi - International Journal of Electronics and …, 2019 - yadda.icm.edu.pl
This research proposes a method to enhance the payload message by embedding
messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add …
messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add …
Digital image signature using triple protection cryptosystem (RSA, Vigenere, and MD5)
RD Ardy, OR Indriani, CA Sari… - … Conference on Smart …, 2017 - ieeexplore.ieee.org
Authentication of digital media has been done with the various scheme, one of them is a
digital signature. The main reason the technique of digital signature appears on the …
digital signature. The main reason the technique of digital signature appears on the …
Simple and secure image steganography using LSB and triple XOR operation on MSB
Least Significant Bit (LSB) is a very popular method in the spatial domain of steganographic
images. This method is widely used and continues to be developed to date, because of its …
images. This method is widely used and continues to be developed to date, because of its …
Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm
G Ardiansyah, CA Sari… - 2017 2nd International …, 2017 - ieeexplore.ieee.org
Public networks such as the Internet are becoming more sophisticated, faster, and cheaper,
so that more and more used for information exchange. This may increase the likelihood of …
so that more and more used for information exchange. This may increase the likelihood of …
An improved message capacity and security using divide and modulus function in spatial domain steganography
Image Steganography is a technique for hiding messages into digital images, so messages
cannot be perceived by the human senses. The two most important aspects of …
cannot be perceived by the human senses. The two most important aspects of …
A comparative study of image cryptographic method
Cryptography is a technique that is widely used to secure data transactions, this technique
has also been widely used to secure digital images. There are several cryptographic …
has also been widely used to secure digital images. There are several cryptographic …