Implementation of Rivest Shamir Adleman Cryptographic Algorithms and Techniques of Steganography First of File for Message Security

5Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Accessing data by an unauthorized person often happens these days. Addressing this case, the techniques of cryptography and steganography was necessary. The science of cryptography use randomizes/disguise the data, whereas the science of steganography to hide data in a way. The cryptographic algorithms to be used is the Rivest Shamir Adleman (RSA) which utilizes two prime numbers to generate a public key and private key. To further enhance the security of message, the algorithm has combined with the First of File (FoF) as steganography techniques. The technique First of File (FoF) works by inserting a message at the beginning of the file image horizontally to produce a stego image that will extract to get the previous ciphertext. Then the ciphertext decrypted to be returned to the original message. By using FoF, in the cover image with large pixel size, the insertion process with FoF is entirely invisible, so the stego image and original image cannot be distinguished, whereas in small pixels there is a black line above the image. A combination of RSA and the FOF will increase data security because when a message has scrambled into a ciphertext and the ciphertext will be inserted into the image file.

Cite

CITATION STYLE

APA

Rachmawati, D., & Munthe, Y. R. (2018). Implementation of Rivest Shamir Adleman Cryptographic Algorithms and Techniques of Steganography First of File for Message Security. In Journal of Physics: Conference Series (Vol. 1090). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1090/1/012062

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free