Abstract

The rapid development of technology not only has a positive impact, but also can have a negative impact such as the development of cyber crime that can cause messages to be unsafe. Message security can be protected using cryptography to convert messages into secret passwords. Steganography is a technique of hiding messages by inserting messages into images that are used to increase message security. In this study, it discusses a combination of hill cipher and LSB algorithms to secure messages. The message used is a 3-bit grayscale image for steganography and text messages with 32, 64 and 128 characters for cryptography. The measuring instruments used in this study are MSE, PSNR, Entropy and travel time (CPU time). Test results prove an increase in security without too damaging the image. This is evidenced by the results of the MSE trial which has a value far below the value 1, the PSNR is> 65 dB with a range of entropy values of 5 to 7, and travel times are almost the same.

Highlights

  • Server, as one of the storage and data exchange places is very vulnerable to data manipulation

  • In this study measurements were made on stego images using Peak Signal Noisy to Ratio (PSNR) and Mean Square Error (MSE)

  • Based on the results of testing in message hiding on digital images by combining the Hill Cipher and Least Significant Bit (LSB) algorithms, it can be concluded that the process of hiding messages using the Hill Cipher algorithm in digital images can improve security and cannot be seen in plain view, because the results of steganography did not change after the insertion of text messages using the Least Significant Beast (LSB) method, so there was no significant change when the image before and after steganography

Read more

Summary

Introduction

As one of the storage and data exchange places is very vulnerable to data manipulation. Most servers only use the security model by using access rights, login functions or using multiple passwords. This is considered insecure because there are various confidential data that need to be secured. Safeguarding data by applying cryptographic techniques is one option. It is known that cryptography can be used in both text and file media. Large data sizes and various perliu file formats are considered in the selection of cryptographic algorithms

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.