Implementation Of Encryption And Hidden Data Using Tiny Encryption Algorithm And End Of File

  • Alfian M
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Security and confidentiality of data is one important aspect of an information system. The information can be misused very large losses in high-profile cases such as vital information confidential corporate, customer data banks and etc. Information security solutions in one of them can be used with cryptography. Cryptographic algorithms used in this study is a tiny encryption algorithm. Cryptographic data security attacks can always wear can occur, with this in mind the authors added security techniques to perform data hiding with the media as a placeholder, this term is called steganography. Steganography is used in this study is the end of the file. These techniques make the process of data hiding which is located at the end of the image, so it does not affect the image quality of the reservoir. In this study, a system built using microsoft visual studio 2010 C#. This system can work well, but has a color image blur caused to the container caused by the inserted message, where the greater the size of the message was inserted then color the image blur that arises will be many more.

Cite

CITATION STYLE

APA

Alfian, M. (2021). Implementation Of Encryption And Hidden Data Using Tiny Encryption Algorithm And End Of File. Journal Basic Science and Technology, 10(3), 93–98. https://doi.org/10.35335/jbst.v10i3.1759

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free