Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
The significance of information security analysis and solutions has been emphasized by earlier research in several application areas. As a result, information technology has advanced more, particularly in the areas of security and data secrecy. An essential component of data exchange is securi...
| Main Authors: | Nurul Adha, Oktarini Saputri, Novita Epa, Sari |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
INTI International University
2023
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/1844/ http://eprints.intimal.edu.my/1844/1/jods2023_19.pdf |
Similar Items
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018)
Prototype development for embedding large amount of information using secure LSB and neural based steganography
by: Saleh, Basam N.
Published: (2009)
by: Saleh, Basam N.
Published: (2009)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
LSB algorithm based on support vector machine in digital image steganography
by: Hussain, Hanizan Shaker, et al.
Published: (2017)
by: Hussain, Hanizan Shaker, et al.
Published: (2017)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
by: Moh, Heng Huong
Published: (2014)
by: Moh, Heng Huong
Published: (2014)
Analysis of Sentiment Based on Opinions from the 2019 Presidential Election
by: Nurul Adha Oktarini, Saputri, et al.
Published: (2024)
by: Nurul Adha Oktarini, Saputri, et al.
Published: (2024)
Data Security Analysis with Advanced Firewall Filtering at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Comparison of data hiding using LSB and DCT for image
by: Ahmed, Zamzam Hohamed
Published: (2014)
by: Ahmed, Zamzam Hohamed
Published: (2014)
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020)
by: Ramalingam, Mritha, et al.
Published: (2020)
Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Effects on quality in audio steganography
by: Ho, Man Yen
Published: (2014)
by: Ho, Man Yen
Published: (2014)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
by: Ahmed, Shakil
Published: (2013)
by: Ahmed, Shakil
Published: (2013)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
HILBERT-LSB-C as Authentication System for Color Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2015)
by: Syifak Izhar, Hisham, et al.
Published: (2015)
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013)
by: Arif Hanafi, Sharif Katullah
Published: (2013)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Achieving security for images by LSB and MD5
by: Alahmad, Mohammad, et al.
Published: (2012)
by: Alahmad, Mohammad, et al.
Published: (2012)
Data-Driven Augmented Reality for Scout Password Recognition in
Interactive Learning Environment
by: M. Soekarno, Putra, et al.
Published: (2024)
by: M. Soekarno, Putra, et al.
Published: (2024)
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Secret channel using video steganography
by: Lee, Kar Yee, et al.
Published: (2017)
by: Lee, Kar Yee, et al.
Published: (2017)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
A secure cryptographic algorithm against side channel attacks
by: Abu, Nur Azman, et al.
Published: (2015)
by: Abu, Nur Azman, et al.
Published: (2015)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
Analysis of WLAN Network Quality Improvement at Bank Mandiri Palembang Sudirman Area using Per Connection Queue Method
by: Misinem, ., et al.
Published: (2023)
by: Misinem, ., et al.
Published: (2023)
Secure mobile AES encryptor (SMAE)
by: Satia, Anbalagan
Published: (2016)
by: Satia, Anbalagan
Published: (2016)
An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
Implementation of a logistic map to calculate the bits required for digital image steganography using the least significant bit (LSB) method
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)
A balanced secure cryptographic algorithm against timing and side channel attacks
by: Abu, Nur Azman, et al.
Published: (2014)
by: Abu, Nur Azman, et al.
Published: (2014)
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications
by: Jahani, Shahram, et al.
Published: (2014)
by: Jahani, Shahram, et al.
Published: (2014)
Steganography application for x-ray image of the transferred patient using least significant bit method
by: Nur Shazana, Matri
Published: (2019)
by: Nur Shazana, Matri
Published: (2019)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023)
by: Ernawan, Ferda
Published: (2023)
Similar Items
-
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
by: Ahmad Zukri, Nurul Hidayah, et al.
Published: (2018) -
Prototype development for embedding large amount of information using secure LSB and neural based steganography
by: Saleh, Basam N.
Published: (2009) -
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021) -
LSB algorithm based on support vector machine in digital image steganography
by: Hussain, Hanizan Shaker, et al.
Published: (2017) -
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)