2019
DOI: 10.33633/jais.v4i1.2331
|View full text |Cite
|
Sign up to set email alerts
|

Upload File Security on the Server Using LSB and Hill Cipher

Abstract: The rapid development of technology not only has a positive impact, but also can have a negative impact such as the development of cyber crime that can cause messages to be unsafe. Message security can be protected using cryptography to convert messages into secret passwords. Steganography is a technique of hiding messages by inserting messages into images that are used to increase message security. In this study, it discusses a combination of hill cipher and LSB algorithms to secure messages. The message used… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Among various steganography methods, the Least Significant Bit (LSB) algorithm has become a hot research topic due to its simplicity and efficiency [5][6]. This method embeds secret information by modifying the least significant bit of image pixels, usually causing minimal visual impact on the image [7]. However, when steganographic images undergo common image processing such as compression, scaling, and noise addition, the embedded information often gets damaged, affecting the integrity and readability of the information [8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Among various steganography methods, the Least Significant Bit (LSB) algorithm has become a hot research topic due to its simplicity and efficiency [5][6]. This method embeds secret information by modifying the least significant bit of image pixels, usually causing minimal visual impact on the image [7]. However, when steganographic images undergo common image processing such as compression, scaling, and noise addition, the embedded information often gets damaged, affecting the integrity and readability of the information [8].…”
Section: Introductionmentioning
confidence: 99%
“…Despite the excellent performance of LSB steganography in hiding information, it has evident shortcomings in the robustness of information extraction [9]. This issue becomes particularly pronounced when dealing with Chinese characters, whose complex encoding can make it difficult for traditional error recovery techniques to accurately reconstruct the original information once it is damaged [10].…”
Section: Introductionmentioning
confidence: 99%
“…Symmetric cryptography techniques are faster at running algorithms than asymmetric cryptography [2,7]. This is because symmetric cryptography uses permutations and substitution calculations [7,8]. One form of symmetric cryptography is Hill Cipher.…”
Section: Introductionmentioning
confidence: 99%
“…Hill ciphers have a matrix key [1,2], and are used to encrypt messages by multiplying the value of a character by that key. Hill Cipher is a very simple and fast method of processing [8][9][10].…”
Section: Introductionmentioning
confidence: 99%