Noble Method for Data Hiding using Steganography Discrete Wavelet Transformation and Cryptography Triple Data Encryption Standard: DES
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
Noble method for data hiding using steganography Discrete Wavelet Transformation: DWT and cryptography triple Data Encryption Standard: DES is proposed. In the current era, information technology has become inseparable from human life, especially regarding the processing and dissemination of information. In line with advances in information technology, there are also parties who want to abuse such information by changing information or even damage it. To avoid that happening, then the data needs to be secured first into other media using the DWT method. The choosing of this method is because the image of the data insertion almost resembles the original image. Triple DES methods are also required to encode data and provide additional security so that hidden data will be difficult to solve. The choosing of this method is because it is resistant against brute force, chosen plaintext, and known plaintext attack. Based on the test, image insertion results in 100% immune to the image manipulation of brightness and contrast, but not so resistant to cropped, resized, and rotated image manipulation. Other tests also indicate that the data which is in the picture can be extracted again and will not undergo any changes.
Authors and Affiliations
Cahya Rahmad, Kohei Arai, Arief Prasetyo, Novriza Arizki
Fruit Fly Optimization Algorithm for Network-Aware Web Service Composition in the Cloud
Service Oriented Computing (SOC) provides a framework for the realization of loosely coupled service oriented applications. Web services are central to the concept of SOC. Currently, research into how web services can be...
Automated Player Selection for a Sports Team using Competitive Neural Networks
The use of data analytics to constitute a winning team for the least cost has become the standard modus operandi in club leagues, beginning from Sabermetrics for the game of basketball. Our motivation is to implement thi...
Issue Tracking System based on Ontology and Semantic Similarity Computation
A computer program is never truly finished; changes are a constant feature of computer program development, there are always something need to be added, redone, or fixed. Therefore, issue-tracking systems are widely used...
An approach for Teaching of National Languages and Cultures through ICT in Cameroon
This article describes the input of ICT to the modernization of teaching national languages and cultures in order to promote cultural diversity as well as dissemination of scientific knowledge through national languages....
Reconstruction of Fingerprint Shape using Fractal Interpolation
One of the severe problems in a fingerprint-based system is retaining the fingerprint images. In this paper, we propose a method to minimize the fingerprint images size and retain the reference points. The method is divi...