Abstract
Noble method for data hiding using steganography Discrete Wavelet Transformation: DWT and cryptography triple Data Encryption Standard: DES is proposed. In the current era, information technology has become inseparable from human life, especially regarding the processing and dissemination of information. In line with advances in information technology, there are also parties who want to abuse such information by changing information or even damage it. To avoid that happening, then the data needs to be secured first into other media using the DWT method. The choosing of this method is because the image of the data insertion almost resembles the original image. Triple DES methods are also required to encode data and provide additional security so that hidden data will be difficult to solve. The choosing of this method is because it is resistant against brute force, chosen plaintext, and known plaintext attack. Based on the test, image insertion results in 100% immune to the image manipulation of brightness and contrast, but not so resistant to cropped, resized, and rotated image manipulation. Other tests also indicate that the data which is in the picture can be extracted again and will not undergo any changes.
Highlights
As the development of the era, the development of technology is overgrowing, especially information technology
Information technology has become inseparable from human life and helps people in many ways, such as processing and disseminating information
Data hiding based on Multi-Resolution Analysis: MRA taking into account scanning of the embedded image for improvement of invisibility is proposed[5]
Summary
As the development of the era, the development of technology is overgrowing, especially information technology. By looking at the data, we can know that cybercrime is a serious problem that we must handle and every year the number of cases of cybercrime will remain substantial It can be a nightmare for companies or even government agencies who want to send data containing confidential information to clients or other companies. Data hiding based on Multi-Resolution Analysis: MRA taking into account scanning of the embedded image for improvement of invisibility is proposed[5]. Data security application is made using DWT of steganography method and 3DES cryptography www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 9, No 11, 2018 method to secure data by inserting data into an image before sending the data. The conclusion is described together with some discussions and future works
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.