Upload File Security on the Server Using LSB and Hill Cipher
Abstract
Full Text:
PDFReferences
D. Nofriansyah, S. Defit, G. W. Nurcahyo, G. Ganefri, R. Ridwan, A. S. Ahmar and R. Rahim, "A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm," Journal of Physiscs : Conference Series, vol. 954, 2018.
Sangeeta and A. Kaur, "A Review on Symmetric Key Cryptography Algorithms," International Journal of Advanced Research in Computer Science , vol. 8, no. 4, pp. 358-361, 2017.
A. Reddy, Vishnuvardhan and Madhuviswanatham, "A Modified Hill Cipher Based on Circulant Matrices," Procedia Technology, vol. 4, pp. 114-118, 2012.
S. Sun and Y. Guo, "A Novel Image Steganography Based on Contourlet Transform and Hill Cipher," Journal of Information Hiding and Multimedia Signal Processing, vol. 6, no. 5, pp. 889-897, 2015.
N. A. Abu, P. W. Adi and O. Mohd, "Robust Digital Image Steganography within Coefficient Difference on Integer Haar Wavelet Transform," International Journal of Video&Image Processing and Network Security IJVIPNS-IJENS, vol. XIV, no. 2, pp. 1-7, 2014.
C. Irawan, D. Setiadi, C. A. Sari and E. H. Rachmawanto, "Hiding and Securing Message on Edge Areas of Image using LSB Steganography and OTP Encryption," Semarang, 2017.
P. Malathi and T. Gireeshkumar, "Relating the embedding efficiency of LSB Steganography techniques in Spatial and Transform domains," Procedia Computer Science, vol. 93, p. 878 – 885, 2016.
E. H. Rachmawanto, R. S. Amin, D. Setiadi and C. A. Sari, "A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size," Semarang, 2017.
E. J. Kusuma, C. A. Sari, E. H. Rachmawanto and D. Setiadi, "A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography," J. ICT Res. Appl, vol. 12, no. 2, pp. 103-122, 2018.
G. Swain, "A steganographic method combining LSB substitution and PVD in a block," Procedia Computer Science, vol. 85, p. 39 – 44, 2016.
A. Devi, A. Sharma and A. Rangra, "A Review on DES, AES and Blowfish for Image Encryption & Decryption," International Journal of Computer Science and Information Technologies, vol. 6, no. 3, pp. 3034-3036, 2015.
DOI: https://doi.org/10.33633/jais.v4i1.2331
Article Metrics
Abstract view : 394 timesPDF - 292 times
Refbacks
- There are currently no refbacks.
Journal of Applied Intelligent System (e-ISSN : 2502-9401, p-ISSN : 2503-0493) is published by Department of Informatics Universitas Dian Nuswantoro Semarang and IndoCEISS.
Journal of Applied Intelligent System indexed by :
This journal is under licensed of Creative Commons Attribution 4.0 International License.