TELKOMNIKA Telecommunication, Computing, Electronics and Control
Dual method cryptography image by two force secure and steganography secret message in IoT

Dublin Core

Title

TELKOMNIKA Telecommunication, Computing, Electronics and Control
Dual method cryptography image by two force secure and steganography secret message in IoT

Subject

Cryptography, Internet of things, Secret key, Secret message, Steganography

Description

With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted data via networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stegoencryption image has been transformed for the Internet of things storage in the database in IoT (data flow), when the user needs any information can be access in via of internet of things (IoTs). The outcome of the proposed system is obtained to be evaluated through different measures, such as peak signal noise ratio (PSNR), mean square error (MSE), entropy, correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.

Creator

Maisa'a Abid Ali K. Al-Dabbas, Ashwak Alabaichi, Ahmed Saleem Abbas

Source

DOI: 10.12928/TELKOMNIKA.v18i6.15847

Publisher

Universitas Ahmad Dahlan

Date

October 2020

Contributor

Sri Wahyuni

Rights

ISSN: 1693-6930

Relation

http://journal.uad.ac.id/index.php/TELKOMNIKA

Format

PDF

Language

English

Type

Text

Coverage

TELKOMNIKA Telecommunication, Computing, Electronics and Control

Files

Collection

Tags

,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

Citation

Maisa'a Abid Ali K. Al-Dabbas, Ashwak Alabaichi, Ahmed Saleem Abbas, “TELKOMNIKA Telecommunication, Computing, Electronics and Control
Dual method cryptography image by two force secure and steganography secret message in IoT,” Repository Horizon University Indonesia, accessed April 4, 2025, https://repository.horizon.ac.id/items/show/4165.