Implementation of Securing Data in the Cloud using Combined Cryptography and Steganography
Main Article Content
Abstract
The recent advance in information technology field forcing us to ensure the privacy of the digital data. It is very important to develop the method that may satisfy the needs. Many methods/techniques applied to reach that goal. One of efficient way to reach that secrecy can be achieved with implementing steganography. TheStego application is using Steganography to work in the digital domain and hides the data information within speech signal. To increase the security, TheStego combines steganography techniques with MD5 encryption techniques. Steganography techniques that applied in TheStego application is using LSB (Least Significant Byte) method. This application have three main features: hide text in an audio carrier, hide image within the audio and an audio inside a wave signal of an audio carrier. TheStego also required the user to enter password before the processing of data hiding begin. The password will act as decryption password. Such approach is implemented to increase the security of this application. So, only the one who knows the password that can extract and decrypt the data inside of the application.
Downloads
Download data is not yet available.
Article Details
How to Cite
[1]
R. Rosalina and N. Hadisukmana, “Implementation of Securing Data in the Cloud using Combined Cryptography and Steganography”, JuTISI, vol. 5, no. 3, Apr. 2020.
Section
Articles
This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (https://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted non-commercial used, distribution and reproduction in any medium.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.