Concept of Data Security in Digital Image Media Using Spread Spectrum Steganography and Playfair Cipher Cryptography
Abstract
Keywords
Full Text:
PDFReferences
G. Prabakaran, R. Bhavani and S. Sankaran, “Dual Wavelet Transform Used in Color Image Steganography Method,” International Conference on Intelligent Computing Applications, pp. 193–197,ISBN. 978-1-4799-3966-4 March, 2014.
A. Malik, G. Sikka, H.K. Verma, “A high capacity text steganography scheme based on LZW compression and color coding”, Eng. Sci. Technol. Int. J. 20 (1) (2017) 72–79.
B. Purnama and H. Rohayani, “A New Modified Caesar Cipher Cryptography Method With Legible Ciphertext From A Message To Be Encrypted”, International Conference on Computer Science and Computational Intelligence (ICCSCI), pp. 195-204, 2015.
M. Nutzinger, C. Fabian and M. Marschalek, “Secure Hybrid Spread Spectrum System for Steganography in Auditive Media”, Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 78-81, ISBN. 978-0-7695-4222-5, 2010.
Sumarsono, M. Anshari and A. Mujahidah., “Expending Technique Cryptography for Plaintext Messages by Modifying Playfair Cipher Algorithm with Matrix 5 x 19”, International Conference on Electrical Engineering and Computer Science (ICECOS), pp. 10-13, October 2019.
A. Singh, “Performance Analysis of Spread Spectrum Techniques”, Conference on Advances in Communication and Control Systems (CAC2S), pp. 683-687, 2013.
Z. Huang, B. Feng, and S. Xiang, “Robust reversible image watermarking scheme based on spread spectrum,” J. Vis. Commun. Image Represent., vol. 93, p. 103808, 2023, doi: https://doi.org/10.1016/j.jvcir.2023.103808.
M. A. Murillo, et al, “Multibiosignal chaotic encryption scheme based on spread spectrum and global diffusion process for e-health,” Biomed. Signal Process. Control, vol. 78, p. 104001, 2022, doi: https://doi.org/10.1016/j.bspc.2022.104001.
L. M. Marvel, C. G. Boncelet, R. Jr., and Charles T., “Methodology of Spread-Spectrum Image Steganography,” Jun. 1998.
L. M. Marvel, C. G. Boncelet and C. T. Retter, "Spread spectrum image steganography," in IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075-1083, Aug. 1999.
F. S. Brundick and L. M. Marvel, “Implementation of Spread Spectrum Image Steganography,” Mar. 2001.
M. Packirisamy, and G. Senthilkumar. "Modified version of playfair cipher using linear feedback shift register." In 2009 International Conference on Information Management and Engineering, pp. 488- 490. IEEE, 2009.
R. Munir, ” Cryptography ”. Bandung: Informatics, 2008
E. Nurkifli, Haodudin, ” Modification of the Playfair Algorithm and Combining with the Linear Feedback Shift Register (LFSR)”, Karawang : Singaperbangsa University Karawang, 2014.
Santi, R.C.N., Implementation of the Playfair Encryption Algorithm in Text Files, Journal of Information Technology DYNAMIK, Vol. XV, No. 1, 2010
DOI: http://dx.doi.org/10.36448/jsit.v15i1.3517
Refbacks
- There are currently no refbacks.
About the Journal | Journal Policies | Author | Information |
Explore: Jurnal Sistem Informasi dan Telematika (Telekomunikasi, Multimedia dan Informatika)
e-ISSN: 2686-181X
Website: http://jurnal.ubl.ac.id/index.php/explore
Email: explore@ubl.ac.id
Published by: Pusat Studi Teknologi Informasi, Fakultas Ilmu Komputer, Universitas Bandar Lampung
Office: Jalan Zainal Abidin Pagar Alam No 89, Gedong Meneng, Bandar Lampung, Indonesia