2019 Fourth International Conference on Informatics and Computing (ICIC) 2019
DOI: 10.1109/icic47613.2019.8985848
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of LSB Image Steganography Combined with Blowfish-RC4 Encryption in Various File Extensions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…The Least Significant Bit (LSB) method is a method for securing messages or information in the form of media, by directly entering messages or information into pixels from the cover image [1]. By changing a small part of each pixel bit, where the position of the bit will be replaced by a message that will be inserted in the selected main media [3], then the changes that occur in the color value does not affect the image quality, this method has a good imperceptibility so that people others cannot see a significant change in the image [2].…”
Section: Methods 21 Lsb Steganographymentioning
confidence: 99%
See 1 more Smart Citation
“…The Least Significant Bit (LSB) method is a method for securing messages or information in the form of media, by directly entering messages or information into pixels from the cover image [1]. By changing a small part of each pixel bit, where the position of the bit will be replaced by a message that will be inserted in the selected main media [3], then the changes that occur in the color value does not affect the image quality, this method has a good imperceptibility so that people others cannot see a significant change in the image [2].…”
Section: Methods 21 Lsb Steganographymentioning
confidence: 99%
“…In its application, the internet has several impacts, for example a positive impact on everyone in finding data or information quickly and freely. The negative impact is that crime on the internet or cybercrime is increasing, so security needs to be held [1]. Therefore, to prevent the hacking of information or data from irresponsible parties, a method is needed to hide messages or information, for example by watermarking, steganography, cryptography and digital signatures [2].…”
Section: Introductionmentioning
confidence: 99%
“…ISSN: 2710-2165 http://doi.org/10.33193/IJSER.2.1.2022.53 https://ijser.aliraqia.edu.iq By means of the hash value in image, the study in [18] targets to demonstrate a hash based LSB method where results are secured by using EXIF data through employing cryptography and steganography. [19] proposes a combination of the Rivest Code 4 (RC4), Least Significant Bit (LSB)-Blowfish because it can offer layered security on confidential data. [20] suggests a new cryptographic method that makes use of the benefits of both significant schemeschaotic image encryption and steganography.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Previous research related to steganography has been carried out by Putri, Ashari, and Rahmat. Putri in her research, using LSB encoding method and encryption method using Blowfish and RC4 [18]. Secret text messages will be encrypted with blowfish then after that, text messages encrypted with RC4, the goal is to improve data security.…”
mentioning
confidence: 99%