Securitary Text on Images with RC-128 Bit Synthric Key Encryption
Abstract
Full Text:
PDFReferences
K. R. Ilaga and C. A. Sari, “Analysis of Secure Image Crypto-Stegano Based on Electronic Code Book and Least Significant Bit,” J. Appl. Intell. Syst., vol. 3, no. 1, pp. 28–38, 2018.
E. H. Rachmawanto and C. A. Sari, “Keamanan File Menggunakan Teknik Kriptografi Shift Cipher,” Techno.COM, vol. 14, no. 4, pp. 329–335, 2015.
K. Ganeshkumar and D. Arivazhagan, “Generating a digital signature based on new cryptographic scheme for user authentication and security,” Indian J. Sci. Technol., vol. 7, no. Specialissue6, pp. 1–5, 2014.
V. Kumar and P. K. Koul, “Robust RSA for Digital Signature,” IJCSI Int. J. Comput. Sci. Issues, vol. 8, no. 6, pp. 359–362, 2011.
P. Saha, “A comprehensive study on digital signature for internet security,” Accent. Trans. Inf. Secur., vol. 1, no. 1, pp. 1–6, 2016.
C. J. Mitchell, “On the Security of 2-Key Triple DES,” IEEE Trans. Inf. Theory, vol. 62, no. 11, pp. 6260–6267, Nov. 2016.
M. B. Pramanik, “Implementation of Cryptography Technique using Columnar Transposition,” pp. 19–23, 2014.
K. Senthil, K. Prasanthi, and R. Rajaram, “A modern avatar of Julius Ceasar and Vigenere cipher,” in 2013 IEEE International Conference on Computational Intelligence and Computing Research, 2013, pp. 1–3.
E. Rachmawanto, C. Sari, Y. Astuti, and L. Umaroh, “KRIPTOGRAFI VERNAM CIPHER UNTUK MENCEGAH PENCURIAN DATA PADA SEMUA EKSTENSI FILE,” in PROSIDING SEMINAR NASIONAL MULTI DISIPLIN ILMU & CALL FOR PAPERS UNISBANK (SENDI_U) KE-2 Tahun 2016, 2016, pp. 46–51.
M. Jain and S. K. Lenka, “Secret data transmission using vital image steganography over transposition cipher,” in 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, pp. 1026–1029.
A. Saraswat, C. Khatri, Sudhakar, P. Thakral, and P. Biswas, “An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication,” Procedia Comput. Sci., vol. 92, pp. 355–360, 2016.
O. Tornea, M. E. Borda, V. Pileczki, and R. Malutan, “DNA Vernam Cipher,” Proc. 3rd Int. Conf. E-Health Bioeng. - EHB 2011, pp. 24–27, 2011.
R. Mathur, S. Agarwal, and V. Sharma, “Solving security issues in mobile computing using cryptography techniques — A Survey,” in International Conference on Computing, Communication & Automation, 2015, pp. 492–497.
P. C. Mandal, “Superiority of Blowfish Algorithm,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 2, no. 9, pp. 196–201, 2012.
D. P. Joseph and M. Krishna, “Cognitive Analytics and Comparison of Symmetric and Asymmetric Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 6, no. 3, pp. 51–56, 2015.
Sangeeta and E. A. Kaur, “A Review on Symmetric Key Cryptography Algorithms,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 4, pp. 358–362, 2017.
V. Rekhate, “Secure and Efficient Message Passing in Distributed Systems using One-Time Pad,” in 2016 International Conference on Computing, Analytics and Security Trends (CAST) College of Engineering Pune, India. Dec 19-21, 2016 Secure, 2016, pp. 393–397.
R. Shukla, H. O. Prakash, R. P. Bhushan, S. Venkataraman, and G. Varadan, “Sampurna Suraksha: Unconditionally Secure and Authenticated One Time Pad Cryptosystem,” in 2013 International Conference on Machine Intelligence and Research Advancement, 2013, pp. 174–178.
A. D. Irfianti, “METODE PENGAMANAN ENSKRIPSI RC4 STREAM CIPHER UNTUK APLIKASI,” Semin. Nas. Apl. Teknol. Inf. 2007 (SNATI 2007), vol. 2007, no. Snati, p. 4, 2007.
A. Mousa and A. Hamad, “Evaluation of the RC4 Algorithm for Data Encryption,” Int. J. Comput. Sci. Appl., vol. 3, no. 1, pp. 44–56, 2006.
N. Sinha, M. Chawda, and K. Bhamidipati, “Enhancing Security of Improved RC4 Stream Cipher by Converting into Product Cipher,” Int. J. Comput. Appl., vol. 94, no. 18, pp. 17–21, May 2014.
I. Sumartono, A. P. U. Siahaan, and N. Mayasari, “An Overview of the RC4 Algorithm,” IOSR J. Comput. Eng., vol. 18, no. 6, pp. 67–73, 2016.
R. Tiwari and A. Sinhal, “Block based text data partition with RC4 encryption for text data security,” Int. J. Adv. Comput. Res., vol. 6, no. 24, pp. 107–113, May 2016.
DOI: https://doi.org/10.33633/jais.v6i2.4620
Article Metrics
Abstract view : 198 timesPDF - 152 times
Refbacks
- There are currently no refbacks.
Journal of Applied Intelligent System (e-ISSN : 2502-9401, p-ISSN : 2503-0493) is published by Department of Informatics Universitas Dian Nuswantoro Semarang and IndoCEISS.
Journal of Applied Intelligent System indexed by :
This journal is under licensed of Creative Commons Attribution 4.0 International License.