利用仿射密码和最低有效位算法实现数据隐藏的新方法

D. Rachmawati, M. A. Budiman
{"title":"利用仿射密码和最低有效位算法实现数据隐藏的新方法","authors":"D. Rachmawati, M. A. Budiman","doi":"10.1109/CAIPT.2017.8320737","DOIUrl":null,"url":null,"abstract":"Data security is not a top priority of most people at the moment. So the common misuse of the data and other security disturbances. To address the security disorder, can be used in the science of encryption data such as Cryptography and Steganography. The science of Cryptography use randomize or disguise the data, whereas the science of Steganography to hide data in a way. In this research the cryptographic algorithms used are Affine cipher Algorithm. Affine cipher algorithm requires a key that contains two integers, i.e. a and k. plaintext encryption process is transformed into ciphertext. Next do the embedding (concealment of data) on image Steganography techniques with the Least Significant Bit (LSB) and insert a message at the last bits of the image. It was needed extraction process to get the previous ciphertext. Then through the decryption stage to get the original plaintext. With a combination of Affine and LSB, data security will increase because after the message is scrambled into a ciphertext, the ciphertext will be inserted into the image file.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"New approach toward data hiding by using affine cipher and least significant bit algorithm\",\"authors\":\"D. Rachmawati, M. A. Budiman\",\"doi\":\"10.1109/CAIPT.2017.8320737\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data security is not a top priority of most people at the moment. So the common misuse of the data and other security disturbances. To address the security disorder, can be used in the science of encryption data such as Cryptography and Steganography. The science of Cryptography use randomize or disguise the data, whereas the science of Steganography to hide data in a way. In this research the cryptographic algorithms used are Affine cipher Algorithm. Affine cipher algorithm requires a key that contains two integers, i.e. a and k. plaintext encryption process is transformed into ciphertext. Next do the embedding (concealment of data) on image Steganography techniques with the Least Significant Bit (LSB) and insert a message at the last bits of the image. It was needed extraction process to get the previous ciphertext. Then through the decryption stage to get the original plaintext. With a combination of Affine and LSB, data security will increase because after the message is scrambled into a ciphertext, the ciphertext will be inserted into the image file.\",\"PeriodicalId\":351075,\"journal\":{\"name\":\"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)\",\"volume\":\"206 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CAIPT.2017.8320737\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIPT.2017.8320737","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

目前,数据安全并不是大多数人的首要任务。所以普遍存在数据误用等安全隐患。为了解决安全混乱的问题,可以采用科学的加密方法对数据进行加密,如密码学和隐写术。密码学使用随机化或伪装数据,而隐写术则在某种程度上隐藏数据。本研究使用的密码算法是仿射密码算法。仿射密码算法需要一个包含两个整数的密钥,即a和k。明文加密过程转化为密文。然后利用最低有效位(LSB)对图像隐写技术进行嵌入(隐藏数据),并在图像的最后位插入信息。要得到之前的密文,需要经过一定的提取过程。然后通过解密阶段得到原始明文。将仿射和LSB结合使用,数据安全性将得到提高,因为在将消息加扰为密文后,密文将被插入到图像文件中。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
New approach toward data hiding by using affine cipher and least significant bit algorithm
Data security is not a top priority of most people at the moment. So the common misuse of the data and other security disturbances. To address the security disorder, can be used in the science of encryption data such as Cryptography and Steganography. The science of Cryptography use randomize or disguise the data, whereas the science of Steganography to hide data in a way. In this research the cryptographic algorithms used are Affine cipher Algorithm. Affine cipher algorithm requires a key that contains two integers, i.e. a and k. plaintext encryption process is transformed into ciphertext. Next do the embedding (concealment of data) on image Steganography techniques with the Least Significant Bit (LSB) and insert a message at the last bits of the image. It was needed extraction process to get the previous ciphertext. Then through the decryption stage to get the original plaintext. With a combination of Affine and LSB, data security will increase because after the message is scrambled into a ciphertext, the ciphertext will be inserted into the image file.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Implementation of real-time static hand gesture recognition using artificial neural network Application of baby's nutrition status using Macromedia Flash Analysis of radio based train control system using LTE-R and analysis of security requirements: The security of the radio based train control system A study on the effective interaction method to improve the presence in social virtual reality game Expert system to optimize the best goat selection using topsis: Decision support system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1