Abstract

Noble method for data hiding using steganography Discrete Wavelet Transformation: DWT and cryptography triple Data Encryption Standard: DES is proposed. In the current era, information technology has become inseparable from human life, especially regarding the processing and dissemination of information. In line with advances in information technology, there are also parties who want to abuse such information by changing information or even damage it. To avoid that happening, then the data needs to be secured first into other media using the DWT method. The choosing of this method is because the image of the data insertion almost resembles the original image. Triple DES methods are also required to encode data and provide additional security so that hidden data will be difficult to solve. The choosing of this method is because it is resistant against brute force, chosen plaintext, and known plaintext attack. Based on the test, image insertion results in 100% immune to the image manipulation of brightness and contrast, but not so resistant to cropped, resized, and rotated image manipulation. Other tests also indicate that the data which is in the picture can be extracted again and will not undergo any changes.

Highlights

  • As the development of the era, the development of technology is overgrowing, especially information technology

  • Information technology has become inseparable from human life and helps people in many ways, such as processing and disseminating information

  • Data hiding based on Multi-Resolution Analysis: MRA taking into account scanning of the embedded image for improvement of invisibility is proposed[5]

Read more

Summary

INTRODUCTION

As the development of the era, the development of technology is overgrowing, especially information technology. By looking at the data, we can know that cybercrime is a serious problem that we must handle and every year the number of cases of cybercrime will remain substantial It can be a nightmare for companies or even government agencies who want to send data containing confidential information to clients or other companies. Data hiding based on Multi-Resolution Analysis: MRA taking into account scanning of the embedded image for improvement of invisibility is proposed[5]. Data security application is made using DWT of steganography method and 3DES cryptography www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 9, No 11, 2018 method to secure data by inserting data into an image before sending the data. The conclusion is described together with some discussions and future works

PROPOSED DATA HIDING METHOD
EXPERIMENTS
CONCLUSIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.