Tiny encryption algorithm and pixel value differencing for enhancement security message

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    A combination of algorithms to improve text security is possible, Tiny Encryption Algorithm and Pixel Value Differencing are two possible combinations of algorithms. Cryptography and steganography processes can be done to secure messages with two stages, encryption for the first stage and the second one for steganography. Using this two-stage make it difficult for irresponsible parties to know information.

     

     


  • Keywords


    Tiny Encryption Algorithm; Pixel Value Differencing; Strengthen Security, Enhancement Security

  • References


      [1] A. Putera, U. Siahaan, and R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,” Int. J. Secur. It is Appl., vol. 10, no. 8, pp. 173–180, Aug. 2016.

      [2] R. Rahim, “128 Bit Hash of Variable Length in Short Message Service Security,” Int. J. Secur. It is Appl., vol. 11, no. 1, pp. 45–58, Jan. 2017.

      [3] R. Rahim, M. Dahria, M. Syahril, and B. Anwar, “Combination of the Blowfish and Lempel-Ziv-Welch algorithms for text compression,” World Trans. Eng. Technol. Educ., vol. 15, no. 3, pp. 292–297, 2017.

      [4] H. Hartono, D. Abdullah, and A. S. Ahmar, “A New Diversity Technique for Imbalance Learning Ensembles,” Int. J. Eng. Technol., vol. 7, no. 2, pp. 478–483, Apr. 2018.

      [5] D. Abdullah, Tulus, S. Suwilo, S. Effendi, and Hartono, “DEA Optimization with Neural Network in Benchmarking Process,” IOP Conf. Ser. Mater. Sci. Eng., vol. 288, no. 1, p. 012041, Jan. 2018.

      [6] R. Rahim et al., “Combination Base64 Algorithm and EOF Technique for Steganography,” J. Phys. Conf. Ser., vol. 1007, no. 1, p. 012003, Apr. 2018.

      [7] R. Rahim, “Man-in-the-middle-attack prevention using interlock protocol method,” ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp. 6483–6487, 2017.

      [8] M. Attaran and I. VanLaar, “Privacy and security on the Internet: how to secure your personal information and company data,” Inf. Manag. Comput. Secur. vol. 7, no. 5, pp. 241–247, 1999.

      [9] K. J. Fitzgerald, “Security and data integrity for LANs and WANs,” Inf. Manag. Comput. Secur. vol. 3, no. 4, pp. 27–33, 1995.

      [10] E. Kartikadarma, T. Listyorini, and R. Rahim, “An Android mobile RC4 simulation for education,” World Trans. Eng. Technol. Educ., vol. 16, no. 1, pp. 75–79, 2018.

      [11] H. Nurdiyanto, R. Rahim, and N. Wulan, “Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement,” J. Phys. Conf. Ser., vol. 930, no. 1, p. 012005, Dec. 2017.

      [12] D. Abdullah, R. Rahim, D. Apdilah, S. Efendi, T. Tulus, and S. Suwilo, “Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm,” in Journal of Physics: Conference Series, 2018, vol. 978, no. 1, p. 012123.

      [13] R. Rahim, H. Winata, I. Zulkarnain, and H. Jaya, “Prime Number: an Experiment Rabin-Miller and Fast Exponentiation,” J. Phys. Conf. Ser., vol. 930, no. 1, p. 012032, Dec. 2017.

      [14] K. Neeraja, P. Rama Chandra Rao, D. Suman Maloji, and D. Mohammed Ali Hussain, “Implementation of security system for bank using open CV and RFID,” Int. J. Eng. Technol., vol. 7, no. 2–7, p. 187, Mar. 2018.

      [15] N. Srinivasu, O. Sree Priyanka, M. Prudhvi, and G. Meghana, “Multilevel classification of security threats in cloud computing,” Int. J. Eng. Technol., vol. 7, no. 1.5 Special Issue 5, pp. 253–257, 2018.

      [16] Y. H. Kim and G. W. Bang, “Development of security camera combined beacon signal for transmission of disaster and crime situation as well as tracking location,” Int. J. Eng. Technol., vol. 7, no. 2, pp. 141–144, 2018.

      [17] D. Abdullah et al., “A Slack-Based Measures for Improving the Efficiency Performance of Departments in Universitas Malikussaleh,” Int. J. Eng. Technol., vol. 7, no. 2, pp. 491–494, Apr. 2018.

      [18] A. E. S. Kacaribu and Ratnadewi, “Multiplying cipher images on visual cryptography with ElGamal algorithm,” in 2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), 2015, pp. 159–162.

      [19] Ratnadewi, R. P. Adhie, Y. Hutama, A. Saleh Ahmar, and M. I. Setiawan, “Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC),” J. Phys. Conf. Ser., vol. 954, no. 1, p. 012009, Jan. 2018.

      [20] L. Legito and R. Rahim, “SMS Encryption Using Word Auto Key Encryption,” Int. J. Recent Trends Eng. Res., vol. 3, no. 1, pp. 251–256, 2017.

      [21] R. Rahim, D. Hartama, H. Nurdiyanto, A. S. Ahmar, D. Abdullah, and D. Napitupulu, “Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm,” J. Phys. Conf. Ser., vol. 954, no. 1, p. 012008, 2018.

      [22] R. Rahim et al., “Searching Process with Raita Algorithm and its Application,” J. Phys. Conf. Ser., vol. 1007, no. 1, p. 012004, Apr. 2018.

      [23] H. Nurdiyanto and R. Rahim, “Enhanced pixel value differencing steganography with government standard algorithm,” in 2017 3rd International Conference on Science in Information Technology (ICSITech), 2017, pp. 366–371.

      [24] R. Bhardwaj and V. Sharma, “Image Steganography Based on Complemented Message and Inverted Bit LSB Substitution,” in Procedia Computer Science, 2016, vol. 93, pp. 832–838.

      [25] M. Ramalingam and N. A. M. Isa, “A steganography approach over video images to improve security,” Indian J. Sci. Technol., vol. 8, no. 1, pp. 79–86, 2015.

      [26] H. Zhang, Q. Guan, and X. Zhao, “Steganography based on adaptive pixel-value differencing scheme revisited,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, vol. 8389 LNCS, pp. 32–47.

      [27] M. Shoeb and V. K. Gupta, “a Crypt Analysis of the Tiny Encryption Algorithm in Key Generation,” Int. J. Commun. Comput. Technol., vol. 01, no. 0138, pp. 5–123, 2013.

      [28] Amandeep and G. Geetha, “Implications of bitsum attack on tiny Encryption Algorithm and XTEA,” J. Comput. Sci., vol. 10, no. 6, pp. 1077–1083, 2014.

      [29] T. Zhang, W. Li, Y. Zhang, and P. Xijian, “Detection of LSB matching steganography based on distribution of pixel differences in natural images,” in IASP 10 - 2010 International Conference on Image Analysis and Signal Processing, 2010, pp. 548–552.

      [30] H. R. Ismaeel, “Apply Block Ciphers Using Tiny Encryption Algorithm (TEA),” Baghdad Sci. J., vol. 7, no. 2, 2010.


 

View

Download

Article ID: 13355
 
DOI: 10.14419/ijet.v7i2.9.13355




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.