z-logo
open-access-imgOpen Access
Implementation of Image Security using Elliptic Curve Cryptography RSA Algorithm and Least Significant Bit Algorithm
Author(s) -
Handrizal,
Herriyance,
J Hanayong,
Muhammad Zarlis,
Poltak Sihombing
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1898/1/012016
Subject(s) - steganography , algorithm , elliptic curve cryptography , encryption , cryptography , key size , computer science , public key cryptography , key (lock) , least significant bit , key exchange , image (mathematics) , theoretical computer science , arithmetic , mathematics , computer security , artificial intelligence , operating system
Data exchange is a very important thing in today’s technological development. Two important factors must be considered in the process of data exchange, namely speed and security. Rapid technological development can result in insecure data because it can be stolen or manipulated by people who are not privileged. Thus, we need a way or method to be able to overcome these problems, such as cryptography and steganography. The Rivest-Shamir-Adleman or RSA algorithm is an asymmetric cryptographic algorithm that uses 2 prime numbers to generate a public key and a private key that is used in the encryption process for the data. The ECC concept is used to determine the seed or initial value in the generation of prime numbers in the RSA Algorithm by using point addition and multiplication in an elliptic curve. The Least Significant Bit Algorithm is a Steganography Algorithm that inserts bits from the message at the last bit in a cover, replacing the last bit. The parameter used is Running Time in steganography. The results of the research show that image files can be hidden in another image file and returned to normal with a combination of cryptography and steganography with an average Running Time for the insertion process of 3090.167 ms and the extraction process of 2917.167 ms.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here