scispace - formally typeset
Open AccessJournal ArticleDOI

File Encryption and Hiding Application Based on AES and Append Insertion Steganography

Reads0
Chats0
TLDR
The application as the implementation of proposed algorithm is proven feasible but only for personal use as some improvements still have to be implemented.
Abstract
Steganography is a method of hiding secret message in other innocuous looking object so that its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method used in this paper is called append insertion steganography method. This method is chosen as an attempt to remove the limitation of message format, which appears in many popular steganography methods. To scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the message with a secret passphrase. A special block of bytes is used to identify and verify the original message so it can be recovered while retaining its integrity. The C# programming language and .NET Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file contains exactly one message file. In the testing, five random files are used as secret message. Their integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm is proven feasible but only for personal use as some improvements still have to be implemented.

read more

Citations
More filters
Journal ArticleDOI

An improved security and message capacity using AES and Huffman coding on image steganography

TL;DR: The proposed AES algorithm for cryptography and DWT for steganography is implemented and Huffman Coding is proposed to reduce the total of the message’s bit and increase the capacity.
Journal ArticleDOI

Good performance images encryption using selective bit t-des on inverted lsb steganography

TL;DR: From 6 testing images which encrypted using proposed scheme present that proposed encryption scheme is twice faster than classic triple DES and slightly faster than double DES, which denoted that proposed scheme generated good quality of stego images.
Proceedings ArticleDOI

Use of the Advanced Encryption Standard Algorithm for Encryption Short Message Service on Real Count Applications

TL;DR: The results obtained with the application of the Advanced Encryption Standard Encryption Algorithm will be able to increase the security of messages sent and ensure their confidentiality against receiving short messages in the real count application system.
Journal ArticleDOI

Square Transposition: An Approach to the Transposition Process in Block Cipher

TL;DR: The Square Transposition can generate random and non-pattern indices, so that transposition can be done better than DES and AES.
Journal ArticleDOI

Penerapan Algoritma AES dan Konversi SMS ke dalam Bahasa KHEK pada Aplikasi Enkripsi Berbasis Mobile Application

TL;DR: Dengan menerapkan algoritma AES dan konversi bahasa khek pada aplikasi enkripsi, pengamanan pesan yang dikirim akan terjamin kerahasiaan nya, sehingga pihak yang tidak berwenang, tidak dapat mendapatkan informasi pesan wedi dekriPSi.
References
More filters
Book

Digital Watermarking and Steganography

TL;DR: This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Book

Introduction to Cryptography

TL;DR: This book explains the basic methods of modern cryptography and is written for readers with only basic mathematical knowledge that are interested in modern cryptographic algorithms and their mathematical foundation.

Cryptographic Message Syntax (CMS)

Russ Housley
TL;DR: This document describes the Cryptographic Message Syntax (CMS), which is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.
BookDOI

Introduction to cryptography

Hans Delfs, +1 more
TL;DR: Introduction to cryptography , Introduction to cryptography, کتابخانه دیجیتال جندی شاپور اهواز
Proceedings ArticleDOI

Block based robust blind image watermarking using discrete wavelet transform

TL;DR: This paper proposed a blind image watermarking technique which embeds watermark into image in frequency domain using discrete wavelet transform, singular value decomposition and torus automorphism techniques and proved that this method is robust against different signal and non signal processing attacks.