2015 International Conference on Green Computing and Internet of Things (ICGCIoT) 2015
DOI: 10.1109/icgciot.2015.7380614
|View full text |Cite
|
Sign up to set email alerts
|

Secret data transmission using vital image steganography over transposition cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 8 publications
0
4
0
1
Order By: Relevance
“…Transposition model is basically making ciphertext by changing plaintext object-object position without shifting the plaintext object, thus in this technique another character is not needed [33]. Reading the matrix value column by column based on the key used is done to get the ciphertext by using this transposition technique [34]. Chiper example of character transposition technique from "Universitas Mulawarman Samarinda" plaintext and using of frame 9x4 is shown by Figure 5.…”
Section: Message Encryption and Decryption With Transposition Modelmentioning
confidence: 99%
“…Transposition model is basically making ciphertext by changing plaintext object-object position without shifting the plaintext object, thus in this technique another character is not needed [33]. Reading the matrix value column by column based on the key used is done to get the ciphertext by using this transposition technique [34]. Chiper example of character transposition technique from "Universitas Mulawarman Samarinda" plaintext and using of frame 9x4 is shown by Figure 5.…”
Section: Message Encryption and Decryption With Transposition Modelmentioning
confidence: 99%
“…Sukhla dkk [3] dalam penelitiannya menyebutkan bahwa algoritma kunci simetris, yaitu Vernam Cipher dapat digunakan untuk meningkatkan keamanan data baik dalam proses enkripsi maupun dekripsi. Mamta Jain [4] dalam penelitiannya menyebutkan bahwa algoritma Vernam Cipher juga telah diterapkan dalam teknik steganografi untuk mengamankan data. Sari, dkk [5] dalam penelitiannya menyebutkan bahwa algoritma Vernam Cipher dapat digunakan untuk proses enkripsi beberapa jenis file dengan ekstensi yang berbeda-beda dan telah digabungkan dengan teknik steganografi End of File.…”
Section: Pendahuluanunclassified
“…Several types of research [12]- [14] showed that the amalgamation of this transformation in a steganography scheme could be more improved. Others including [15]- [17], associate steganographic and cryptography techniques to improve the security of private messages. There are different cryptographic techniques, including one time pad (OTP), advanced encryption standard (AES), rivest-shamir-adleman (RSA), data encryption standard (DES), and blowfish [16], [18], [19].…”
Section: Introductionmentioning
confidence: 99%