CFP last date
20 December 2024
Reseach Article

Implementation of Integration Blowfish Cryptography Methods with Blend Steganography to Improve Security Text Messages

by Rahmad Zainul Abidin, Yudi Prayudi, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 7
Year of Publication: 2015
Authors: Rahmad Zainul Abidin, Yudi Prayudi, Imam Riadi
10.5120/ijca2015907493

Rahmad Zainul Abidin, Yudi Prayudi, Imam Riadi . Implementation of Integration Blowfish Cryptography Methods with Blend Steganography to Improve Security Text Messages. International Journal of Computer Applications. 132, 7 ( December 2015), 27-31. DOI=10.5120/ijca2015907493

@article{ 10.5120/ijca2015907493,
author = { Rahmad Zainul Abidin, Yudi Prayudi, Imam Riadi },
title = { Implementation of Integration Blowfish Cryptography Methods with Blend Steganography to Improve Security Text Messages },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 7 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 27-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number7/23607-2015907493/ },
doi = { 10.5120/ijca2015907493 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:28:32.417204+05:30
%A Rahmad Zainul Abidin
%A Yudi Prayudi
%A Imam Riadi
%T Implementation of Integration Blowfish Cryptography Methods with Blend Steganography to Improve Security Text Messages
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 7
%P 27-31
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Various techniques to ward off evil that uses information technology have been made, such as the delivery of messages by combining techniques Blowfish cryptography with steganography DCS (Dynamic Cell Spreading). However, DCS has a weakness when compared to steganography Blend. The disadvantage is the DCS insert text data in all the colors RGB. This will result in more pixels change and easily detected image embed text (stego image), while Blend is fewer the pixel changes. Based on DCS weakness, this research proposes the incorporation of steganographic techniques Blend as data embed technique and the Blowfish cryptography as data encryption technique. This research testing process to MSE and PNSR analysis, to determine the rate of change of the original image (cover image) with stego image. Then Blend MSE PNSR results compared to the DCS. The comparison showed that PSNR Blend value is higher than the value of DCS and MSE Blend value is lower than the value of DCS. Obtained conclusions that the method of integration Blowfish cryptography with Blend steganography is better than the DCS steganography.

References
  1. Autoimager. http://www.autoimager.com/download.asp. Accessed on 1 September 2015
  2. Ansari, Munawir. (2015). Compare Metode Hybrid Image Watermarking DWT-SVD with RDWT-SVD For Protection In Digital Image. Yogyakarta, Industrial Technology Faculty, Indonesia of Islamic Universitas.
  3. Boora & Gambhir. (2013). Arnold Transform Based Steganography. International Journal of Soft Computing and Engineering (IJSCE). ISSN: 2231-2307, Volume-3, Issue-4.
  4. Cheddad, A., Condell, J., Curran, K., Kevitt, P.Mc., 2010. Digital Image Steganography : Survey and Analysis of Current Methods. Signal Processing, Elsevier. Northern Ireland, UK.
  5. Gutte, Chincholkar and Lahane. (2013). Steganography For Two And Three Lsbs Using Extended Using Extended Substitution Algorithm. Ictact Journal On Communication Technology, March 2013, volume: 04, issue: 01.
  6. Haldankar & Kuwelkar. (2014). Implementation Of Aes And Blowfish Algorithm. International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308.
  7. Padmaa. & Venkataramani. (2014). Encypted Secret Blend With Image Steganography For Enhanced Imperceptibility Dan Capacity. Tamilnadu India.
  8. Poornima & Iswarya. (2013). AN OVERVIEW OF DIGITAL IMAGE STEGANOGRAPHY. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.1,February 2013.
  9. SIPI, The USC-SIPI Image Database, website pada http://sipi.usc.edu, diakses pada 24 Agustus 2015.
  10. Wijaya, Wijaya Satriya. (2014). Integration of DCS Steganography Method In Image With Blowfish Cryptography. Yogyakarta, Industrial Technology Faculty, Indonesia of Islamic Universitas.
  11. Wijaya, Satriya. & Prayudi, Yudi. (2014). The Concept Of The Hidden Message Using Dynamic Cell Spreading steganographic techniques. Jurnal media informatika, ISSN: 0854-4743, Volume 2. NO. 1, PP 23-38.
  12. Yadav. (2011). Information Security Using Blend of Steganography and Cryptography. Int. J. Comp. Tech. Appl., Vol 2 (6), 2023-2036. ISSN:2229-6093
  13. Kumar and Karthikeyan. 2012. Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms. I. J. Computer Network and Information Security, 2012, 2, 22-28. DOI: 10.5815/ijcnis.2012.02.04
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Blowfish steganography Blend.