Reynaldo E. Castillo, G. Cayabyab, Paula Jean M. Castro, M. Aton
{"title":"BlockSight:一种使用高级加密标准和最低有效位算法的移动图像加密","authors":"Reynaldo E. Castillo, G. Cayabyab, Paula Jean M. Castro, M. Aton","doi":"10.1145/3209914.3209922","DOIUrl":null,"url":null,"abstract":"In this paper, we developed a new mobile application designed to protect your images stored on your mobile phone using Advanced Encryption Standard algorithm to secure images by encrypting it and Least Significant Bit algorithm to process the encrypted image and embed it into another image. To achieve high level of encryption, a 256 bit length key of Advance Encryption Standard is used to maximize protection and Diffie-Hellman algorithm to secure the processed key to both parties without interference from outside. In steganography, the encrypted image will be invisible into the cover image in which potential hackers do not have any idea about the original image embedded inside of the cover image, and with this even if the hacker got the image it will still need the correct key to decrypt it or else the image will be deleted The study used Rapid Application Development Model as the project development methodology, which allows the preceding phase to iterate until the application is refined, requirements are gathered and allows early testing of the prototypes during every iteration to reduce the risk of any major issues in the final deployment of the application. With the use of ISO/IEC/IEEE 29119 Testing Standards, the application was evaluated in terms of its security, usability and reliability. Based on the evaluation results, the application satisfied the respondents and possible users with an overall mean rating 4.17 or acceptable.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"BlockSight: A Mobile Image Encryption Using Advanced Encryption Standard and Least Significant Bit Algorithm\",\"authors\":\"Reynaldo E. Castillo, G. Cayabyab, Paula Jean M. Castro, M. Aton\",\"doi\":\"10.1145/3209914.3209922\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we developed a new mobile application designed to protect your images stored on your mobile phone using Advanced Encryption Standard algorithm to secure images by encrypting it and Least Significant Bit algorithm to process the encrypted image and embed it into another image. To achieve high level of encryption, a 256 bit length key of Advance Encryption Standard is used to maximize protection and Diffie-Hellman algorithm to secure the processed key to both parties without interference from outside. In steganography, the encrypted image will be invisible into the cover image in which potential hackers do not have any idea about the original image embedded inside of the cover image, and with this even if the hacker got the image it will still need the correct key to decrypt it or else the image will be deleted The study used Rapid Application Development Model as the project development methodology, which allows the preceding phase to iterate until the application is refined, requirements are gathered and allows early testing of the prototypes during every iteration to reduce the risk of any major issues in the final deployment of the application. With the use of ISO/IEC/IEEE 29119 Testing Standards, the application was evaluated in terms of its security, usability and reliability. Based on the evaluation results, the application satisfied the respondents and possible users with an overall mean rating 4.17 or acceptable.\",\"PeriodicalId\":174382,\"journal\":{\"name\":\"Proceedings of the 1st International Conference on Information Science and Systems\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 1st International Conference on Information Science and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3209914.3209922\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st International Conference on Information Science and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3209914.3209922","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
BlockSight: A Mobile Image Encryption Using Advanced Encryption Standard and Least Significant Bit Algorithm
In this paper, we developed a new mobile application designed to protect your images stored on your mobile phone using Advanced Encryption Standard algorithm to secure images by encrypting it and Least Significant Bit algorithm to process the encrypted image and embed it into another image. To achieve high level of encryption, a 256 bit length key of Advance Encryption Standard is used to maximize protection and Diffie-Hellman algorithm to secure the processed key to both parties without interference from outside. In steganography, the encrypted image will be invisible into the cover image in which potential hackers do not have any idea about the original image embedded inside of the cover image, and with this even if the hacker got the image it will still need the correct key to decrypt it or else the image will be deleted The study used Rapid Application Development Model as the project development methodology, which allows the preceding phase to iterate until the application is refined, requirements are gathered and allows early testing of the prototypes during every iteration to reduce the risk of any major issues in the final deployment of the application. With the use of ISO/IEC/IEEE 29119 Testing Standards, the application was evaluated in terms of its security, usability and reliability. Based on the evaluation results, the application satisfied the respondents and possible users with an overall mean rating 4.17 or acceptable.