{"title":"基于Playfair密码算法和LSB隐写术的数据文本保护","authors":"Apri Siswanto, Sri Wahyuni, Yudhi Arta","doi":"10.5220/0009144501250129","DOIUrl":null,"url":null,"abstract":": Encryption and steganography are needed to ensure the integrity and confidentiality of data in the process of sending data on the internet. In this paper, there are two stages to securing the message. The first step is to randomize messages to be sent with Polygram cipher substitution. The second step is to avoid messages from third party suspicions that can be done with the steganography process. The message used in this study is text. In the cryptographic process, the message in the form of text will be encrypted with the Playfair Cipher method, and then the encrypted message will be carried out in the LSB steganography process on a gray scale 8-bit digital image on a scale of 0-255. This study shows that by using Playfair Cipher and cryptographic Steganography in insertion, encrypted messages will be difficult to return to original messages by unauthorized parties. The result of this application is that you can insert hidden messages in text form into PNG format digital image files and can extract hidden messages from the image (stego-image).","PeriodicalId":382428,"journal":{"name":"Proceedings of the Second International Conference on Science, Engineering and Technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Combination Playfair Cipher Algorithm and LSB Steganography for Data Text Protection\",\"authors\":\"Apri Siswanto, Sri Wahyuni, Yudhi Arta\",\"doi\":\"10.5220/0009144501250129\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": Encryption and steganography are needed to ensure the integrity and confidentiality of data in the process of sending data on the internet. In this paper, there are two stages to securing the message. The first step is to randomize messages to be sent with Polygram cipher substitution. The second step is to avoid messages from third party suspicions that can be done with the steganography process. The message used in this study is text. In the cryptographic process, the message in the form of text will be encrypted with the Playfair Cipher method, and then the encrypted message will be carried out in the LSB steganography process on a gray scale 8-bit digital image on a scale of 0-255. This study shows that by using Playfair Cipher and cryptographic Steganography in insertion, encrypted messages will be difficult to return to original messages by unauthorized parties. The result of this application is that you can insert hidden messages in text form into PNG format digital image files and can extract hidden messages from the image (stego-image).\",\"PeriodicalId\":382428,\"journal\":{\"name\":\"Proceedings of the Second International Conference on Science, Engineering and Technology\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Second International Conference on Science, Engineering and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5220/0009144501250129\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Second International Conference on Science, Engineering and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0009144501250129","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Combination Playfair Cipher Algorithm and LSB Steganography for Data Text Protection
: Encryption and steganography are needed to ensure the integrity and confidentiality of data in the process of sending data on the internet. In this paper, there are two stages to securing the message. The first step is to randomize messages to be sent with Polygram cipher substitution. The second step is to avoid messages from third party suspicions that can be done with the steganography process. The message used in this study is text. In the cryptographic process, the message in the form of text will be encrypted with the Playfair Cipher method, and then the encrypted message will be carried out in the LSB steganography process on a gray scale 8-bit digital image on a scale of 0-255. This study shows that by using Playfair Cipher and cryptographic Steganography in insertion, encrypted messages will be difficult to return to original messages by unauthorized parties. The result of this application is that you can insert hidden messages in text form into PNG format digital image files and can extract hidden messages from the image (stego-image).