Abstract

Advances in technology in the field of internet, making the Internet become the most popular data transmission media for now. This is certainly not free from the incidence of cyber crime, such as theft and data modification. Given the losses caused by data manipulation is very detrimental to the owner, then the original data can be misused in the cyber world. Cryptography offers an algorithm for randomizing data, so it can not be read by unauthorized people. The cryptography technique was implemented using Triple Data Encyption Standard (3DES) given the results of a randomized cryptographic algorithm, it is possible to arouse suspicion from the viewer. For that will be done the process of insertion of cryptographic files into another media in the form of images commonly referred to as steganography. The steganography technique that will be used is End of File (EOF). The combination of 3DES and EOF in the 64x64 pixel image with grayscale color format produces the fastest image processing time of 173.00192 seconds with the highest Peak Signal to Noise Ratio (PSNR) value of 25.0004 dB, while in the 128x128 pixel image with grayscale format has produced the highest PSNR 21.0084 dB.

Highlights

  • Improved technology in the field of internet trigger the occurrence of problems, especially in the field of Internet security

  • The technique of cryptography that will be implemented in this research is 3DES. 3DES has a good level of security when compared to other cryptographic techniques [1]

  • Cryptography has a weakness, the resulting file looks random, and this can cause suspicion for people who see it [2]. For overcoming these deficiencies need to be done the process of insertion of the encrypted file into another media, which is often referred to as steganography

Read more

Summary

INTRODUCTION

Improved technology in the field of internet trigger the occurrence of problems, especially in the field of Internet security. Cryptography has a weakness, the resulting file looks random, and this can cause suspicion for people who see it [2] For overcoming these deficiencies need to be done the process of insertion of the encrypted file into another media, which is often referred to as steganography. The EOF technique is chosen because it has a fast time [3] compared to other steganographic techniques The combination of both methods will be implemented on a 64x64 pixel digital image with a grayscale color format. Based on the above problem, the purpose of this research is the implementation of 3DES cryptography algorithm and EOF steganography to secure image data sent via internet media

METHODS
RESULTS AND DISCUSSION
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call