2019
DOI: 10.22219/kinetik.v4i3.785
|View full text |Cite
|
Sign up to set email alerts
|

A Combination of Hill CIPHER-LSB in RGB Image Encryption

Abstract: The progress of the development of digital technology today, many people communicate by sending and receiving messages. However, along with extensive technological developments, many crimes were committed. In avoiding these crimes, data security needs to be done. Form of data security in the form of cryptography and steganography. One of the cryptographic techniques is the hill cipher algorithm. Hill ciphers include classic cryptographic algorithms that are very difficult to solve. While the most popular stega… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 17 publications
0
2
0
1
Order By: Relevance
“…Having tested a combination of Hill Cipher algorithm to encrypt text messages and LSB algorithm to hide text messages into image media [15,16], the trial proved that by combining Hill Cipher and LSB algorithms can increase security without damaging image media. However, these trials need to be carried out more in-depth development by increasing the algorithm from two levels to three levels.…”
Section: Introductionmentioning
confidence: 99%
“…Having tested a combination of Hill Cipher algorithm to encrypt text messages and LSB algorithm to hide text messages into image media [15,16], the trial proved that by combining Hill Cipher and LSB algorithms can increase security without damaging image media. However, these trials need to be carried out more in-depth development by increasing the algorithm from two levels to three levels.…”
Section: Introductionmentioning
confidence: 99%
“…Information security is an important aspect that needs to be considered in building a system [10]. As the main gate of the system, has gaps and vulnerabilities, including sending and receiving the payload from the server as plain text, because it should be encrypted in sending the payload to maintain the payload's anonymity [11,12,13]. Security in the authentication process needs to be improved to deal with cyberattacks such as data sniffing, cross-site scripting (XSS), and man-in-the-middle attacks [14].…”
Section: Introductionmentioning
confidence: 99%
“…Penelitian oleh Agustini dkk yang melakukan pengabungan onoalphabetic cipher dan Vigenere cipher dengan menerapkan key enkripsi sebanyak dua key[11]. Penelitian oleh Megantara dkk yang melakukan kombinasi algoritma Hill Cipher dengan LSB Cipher dalam mengamankan RGB image dengan proses membuat sistem penentuan pilihan panjang karakter pesan yang terdiri dari 32, 64 dan 128 karakter, yang kemudian dienkripsikan kembali oleh Hill Cipher[17]. Penelitian oleh Megantara dkk yang melakukan peningkatan kompleksitas pengaman pesan dengan super enkrpsi yang dirancanag menggunakan PHP native dengan algoritma Hill Cipher dan Transposisi kolom untuk memudahkan proses enkripsi deskripsi[21].…”
unclassified