Combination of Blowfish Algorithm First of File Algorithm and End of File Algorithm on Image Security

0Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this age, there are many types of information. An image is a form of information that can be sent from anyone to anyone in various ways. But in the shipping process, there is often a hijacking or theft by an unwanted party. So that information must be secured by cryptography to avoid this. To add a sense of security between the sender and recipient, cryptography will be combined with steganography. In this study, the Blowfish Algorithm was combined with First Of File and End Of File steganography methods. Information that has been encrypted will be inserted into other media. Likewise for the recipient, can extract information then decrypt information. Based on experiments conducted on the Blowfish algorithm, the time of encryption and decryption needed when the resolution of the image gets larger is linearly proportional to the value. MSE gets smaller, and the PSNR value gets higher, it shows better image quality. Cover image will increase in size after the embedding process so that it becomes a stego image.

Cite

CITATION STYLE

APA

Rachmawati, D., Budiman, M. A., & Fattahurrahman, M. H. N. (2019). Combination of Blowfish Algorithm First of File Algorithm and End of File Algorithm on Image Security. In Journal of Physics: Conference Series (Vol. 1235). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1235/1/012078

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free