Enhancing Data Security Using DES-based Cryptography and DCT-based Steganography

被引:0
|
作者
Solichin, Achmad [1 ]
Ramadhan, Erwin Wahyu [1 ]
机构
[1] Budi Luhur Univ, Fac Informat Technol, Dept Informat, Jakarta, Indonesia
关键词
data security; application; DES; DCT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security and privacy of the data transmitted is an important aspect of the exchange of information on the Internet network. Cryptography and Steganography are two of the most commonly used digital data security techniques. In this research, we proposed the combination of the cryptographic method with Data Encryption Standard (DES) algorithm and the steganographic method with Discrete Cosine Transform (DCT) to develop a digital data security application. The application can be used to secure document data in Word, Excel, Powerpoint or PDF format. Data encrypted with DES algorithm and further hidden in image cover using DCT algorithm. The results showed that the quality of the image that has been inserted (stego-image) is still in a good category with an average PSNR value of 46.9 dB. Also, the experiment results show that the average computational time of 0.75 millisecond/byte, an average size increase of 4.79 times and a success rate of 58%. This research can help solve the problem of data and information security that will be sent through a public network like the internet.
引用
收藏
页码:618 / 621
页数:4
相关论文
共 50 条
  • [1] DCT-based Digital Image Steganography
    Zhou, Jiamin
    Pan, Yang
    Yang, Rener
    [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5, 2014, 496-500 : 1986 - 1990
  • [2] Polynomial fitting: enhancing the stego quality of DCT-based Steganography schemes
    Mohammed Baziyad
    Tamer Rabie
    Ibrahim Kamel
    Mahdi Benkhelifa
    [J]. Multimedia Tools and Applications, 2022, 81 : 43999 - 44019
  • [3] Polynomial fitting: enhancing the stego quality of DCT-based Steganography schemes
    Baziyad, Mohammed
    Rabie, Tamer
    Kamel, Ibrahim
    Benkhelifa, Mahdi
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (30) : 43999 - 44019
  • [4] Portable real-time DCT-based steganography using OpenCL
    Ante Poljicak
    Guillermo Botella
    Carlos Garcia
    Luka Kedmenec
    Manuel Prieto-Matias
    [J]. Journal of Real-Time Image Processing, 2018, 14 : 87 - 99
  • [5] Developing an adaptive DCT-based steganography method using a genetic algorithm
    Sabeti, Vajiheh
    Aghabagheri, Adeleh
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (13) : 19323 - 19346
  • [6] Portable real-time DCT-based steganography using OpenCL
    Poljicak, Ante
    Botella, Guillermo
    Garcia, Carlos
    Kedmenec, Luka
    Prieto-Matias, Manuel
    [J]. JOURNAL OF REAL-TIME IMAGE PROCESSING, 2018, 14 (01) : 87 - 99
  • [7] Developing an adaptive DCT-based steganography method using a genetic algorithm
    Vajiheh Sabeti
    Adeleh Aghabagheri
    [J]. Multimedia Tools and Applications, 2023, 82 : 19323 - 19346
  • [8] A Novel DCT-Based Video Steganography Algorithm for HEVC
    Liu, Si
    Liu, Yunxia
    Feng, Cong
    Zhao, Hongguo
    [J]. INTELLIGENT COMPUTING METHODOLOGIES, PT III, 2022, 13395 : 604 - 614
  • [9] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [10] Enhancing security of images by Steganography and Cryptography techniques
    Bukhari, Sadaf
    Arif, Muhammad Shoaib
    Anjum, M. R.
    Dilbar, Samia
    [J]. 2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 531 - 534