An improved security and message capacity using AES and Huffman coding on image steganography

CA Sari, G Ardiansyah… - … Electronics and Control …, 2019 - telkomnika.uad.ac.id
Abstract Information security is very important and has been widely implemented.
Cryptography and steganography are two common methods that can be implemented to …

Good performance images encryption using selective bit T-des on inverted Lsb steganography

CA Sari, EH Rachmawanto, EJ Kusuma - Jurnal Ilmu Komputer dan …, 2019 - neliti.com
Mengirimkan gambar melalui internet perlu diamankan karena risiko dicuri. Teknik
keamanan yang dapat digunakan untuk mengamankan data terutama gambar adalah …

Crytographical primitive for blockchain: a secure random DNA encoded key generation technique

A Sanober, S Anwar - Multimedia Tools and Applications, 2022 - Springer
Data Security has always been a challenge while sharing sensitive information and a lot of
techniques have been developed to achieve it. Security should not hamper the availability of …

One to many (new scheme for symmetric cryptography)

AD Wowor, B Susanto - … Computing Electronics and Control), 2023 - telkomnika.uad.ac.id
Symmetric cryptography will always produce the same ciphertext if the plaintext and the
given key are the same repeatedly. This condition will make it easier for cryptanalysts to …

Keamanan Data Menggunakan Gabungan Kriptografi AES dan RSA

C Irawan, EH Rachmawanto - 2021 - unisbank.ac.id
Abstract Kriptografi menggunakan algoritma Advamce Encryption Standard (AES) maupun
Rivest Shamir Adleman (RSA) secara individual sudah sering digunakan baik dalam proses …

Penerapan Algoritma AES dan Konversi SMS ke dalam Bahasa KHEK pada Aplikasi Enkripsi Berbasis Mobile Application

C Kirana, E Sugianto - Khazanah Informatika: Jurnal Ilmu …, 2019 - journals.ums.ac.id
Telepon Selular (ponsel) atau dikenal dengan nama HP (handphone) memiliki banyak
keunggulan dan kelebihan baik dari segi fasilitas yang dimilikinya, salah satu fasilitas yang …

Square transposition: an approach to the transposition process in block cipher

MAI Pekereng, AD Wowor - Bulletin of Electrical Engineering and …, 2021 - beei.org
The transposition process is needed in cryptography to create a diffusion effect on data
encryption standard (DES) and advanced encryption standard (AES) algorithms as standard …

[PDF][PDF] Video steganography using 3D distance calculator based on YCbCr color components

EJ Baker, AA Majeed, SA Alazawi, S Kasim… - Indonesian Journal of …, 2021 - core.ac.uk
Steganography techniques have taken a major role in the development in the field of
transferring multimedia contents and communications. Therefore, field of steganography …

Use of the Advanced Encryption Standard Algorithm for Encryption Short Message Service on Real Count Applications

AA Alkodri, B Isnanto, SH Saputro… - … on Cyber and IT …, 2020 - ieeexplore.ieee.org
Short Message Service (SMS) technology is a popular service among cellular phone users
in Indonesia. The development of the SMS facility has been developed in the utilization of …

[PDF][PDF] Digital Rights Management of Images Using Quantinacci Sequence and LSB Embedding

HY Mohamed - 2023 - researchgate.net
The pressing need to protect digital media nowadays is now more prominent than ever due
to the continuous technological advancements that happen daily. One way of ensuring …