TELKOMNIKA Telecommunication, Computing, Electronics and Control
Dual method cryptography image by two force secure and steganography secret message in IoT
Dublin Core
Title
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Dual method cryptography image by two force secure and steganography secret message in IoT
Dual method cryptography image by two force secure and steganography secret message in IoT
Subject
Cryptography, Internet of things, Secret key, Secret message, Steganography
Description
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted data via networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stegoencryption image has been transformed for the Internet of things storage in the database in IoT (data flow), when the user needs any information can be access in via of internet of things (IoTs). The outcome of the proposed system is obtained to be evaluated through different measures, such as peak signal noise ratio (PSNR), mean square error (MSE), entropy, correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
Creator
Maisa'a Abid Ali K. Al-Dabbas, Ashwak Alabaichi, Ahmed Saleem Abbas
Source
DOI: 10.12928/TELKOMNIKA.v18i6.15847
Publisher
Universitas Ahmad Dahlan
Date
October 2020
Contributor
Sri Wahyuni
Rights
ISSN: 1693-6930
Relation
http://journal.uad.ac.id/index.php/TELKOMNIKA
Format
PDF
Language
English
Type
Text
Coverage
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Files
Collection
Citation
Maisa'a Abid Ali K. Al-Dabbas, Ashwak Alabaichi, Ahmed Saleem Abbas, “TELKOMNIKA Telecommunication, Computing, Electronics and Control
Dual method cryptography image by two force secure and steganography secret message in IoT,” Repository Horizon University Indonesia, accessed April 4, 2025, https://repository.horizon.ac.id/items/show/4165.
Dual method cryptography image by two force secure and steganography secret message in IoT,” Repository Horizon University Indonesia, accessed April 4, 2025, https://repository.horizon.ac.id/items/show/4165.