z-logo
open-access-imgOpen Access
The insertion of confidential information into digital images using blowfish cryptography and end of file steganography
Author(s) -
Eko Aribowo,
Adi Suryadi
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/821/1/012040
Subject(s) - steganography , computer science , cryptography , robustness (evolution) , steganography tools , header , computer security , computer vision , image (mathematics) , computer network , biochemistry , chemistry , gene
Identity Theft Resource Centre revealed there were 668 cases of cybercrime occurring with a total number of lost data 22,408,258 started from January to July 2018. It indicates that there was a vulnerability in the defences from attacks carried out through the internet. Thus, the world of information systems should also be accompanied by a high level of security. The stages of system development were started from the analysis of system requirements, the design of the UML, implementation, and testing. The testing process into two-phase. Firstly, system output testing in the form of stego image with various criteria, namely imperceptible, fidelity, recovery, robustness, and histogram. Secondly, system feasibility testing using the SUS method. Based on the results, it revealed that the merging of the blowfish cryptographic method and the end of file steganography was not very effective because, based on the output testing with robustness criteria; it was proven that the message inserted into the image was damaged during extraction. The changes in the size of the original cover with the resulted stego image had increased file size with a ratio of 1: 5.5, meaning that each created stego image was five times the size of the original image.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here