Redirigiendo al acceso original de articulo en 16 segundos...
ARTÍCULO
TITULO

Data Security Using Multi-bit LSB and Modified Vernam Cipher

Goklas Tomu Simbolon    
Opim Salim Sitompul    
Erna Budhiarti Nababan    

Resumen

Data security is one of the most important aspects of today's information era. Some methods are used to secure important data from hackers. The LSB is a steganographic algorithm that is often used to store data in the last bit. In order to improve the security, we combine steganography with cryptography enables. In this research LSB is modified using the multi-bit LSB model. Modifications are made to the bits of each character, the rotation by a certain amount can randomize the plaintext content before cryptographic algorithm, Vernam is performed. The bit on LSB can be inserted data as much as 1, 2, 3 or 4 - bit information. The calculation results of MSE and PSNR values indicate that the use of 1-bit LSB is superior to that of 2-, 3-, or 4-bit LSB.

Palabras claves

 Artículos similares

       
 
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari    
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac... ver más
Revista: Information

 
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari    
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani... ver más
Revista: Algorithms

 
Darja Cirjulina, Ruslans Babajans, Filips Capligins, Deniss Kolosovs and Anna Litvinenko    
This manuscript presents an experimental study of Quadrature Chaos Shift Keying (QCSK) as a means to tighten the physical layer security of Internet of Things (IoT) communication. Our study examines the characteristics and operational aspects of chaos os... ver más
Revista: Applied Sciences

 
Md Momin Al Aziz, Md Toufique Morshed Tamal and Noman Mohammed    
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today?s data security problems. While effective FHE platforms can address modern data security concerns in unsecure... ver más
Revista: Information

 
Lixin Wang, Wenlei Sun, Jintao Zhao, Xuedong Zhang, Cheng Lu and Hao Luo    
As a critical raw material for the textile industry, cotton lint provides various types of cotton yarns, fabrics and finished products. However, due to the complexity of the supply chain and its many links, information records are often missing, inaccura... ver más
Revista: Applied Sciences