2019
DOI: 10.1088/1742-6596/1201/1/012033
|View full text |Cite
|
Sign up to set email alerts
|

Optimization Substitution Cipher And Hidden Plaintext In Image Data Using LSB Method

Abstract: Cryptography is a way to protect certain messages that have confidential properties or have properties that must be protected from unrelated parties. Substitution techniques have several algorithms such as hill cipher, vigenere cipher, one-time pad and others. This research is a development of previous research that has been carried out many combine substitution techniques. This research combines 4 substitution techniques that have been modified and stored messages that have been hidden into an image with the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 4 publications
0
2
0
1
Order By: Relevance
“…In practice, this method is cumbersome and unnecessary. However, this approach may have potential uses in information encryption [ 22 ].…”
Section: Overview Of Dna Storagementioning
confidence: 99%
“…In practice, this method is cumbersome and unnecessary. However, this approach may have potential uses in information encryption [ 22 ].…”
Section: Overview Of Dna Storagementioning
confidence: 99%
“…It will also still be good on grayscale digital images. From this came the idea to use the random sequence generated by the chaos function to determine the last 1-4 bits of insertion in the cover image (Ariyus, 2019). Furthermore, will be discussed regarding the concept of Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR).…”
Section: Introductionmentioning
confidence: 99%
“…Optimalisasi cipher substitusi juga pernah dituliskan oleh dony ariyus dan ardiansyah dengan nmenggunakan LSB Method. Modifikasi kriptografi dilakukan di metode viginere cipher dengan menggunakan letters key dan hill cipher, selain itu juga dilakukan modifikasi di Hill Cipher, Caesar Cipher dan One Time Pad (OTP) [6].…”
unclassified