Enter your keyword

2-s2.0-85064754016

[vc_empty_space][vc_empty_space]

Graph Steganography Based on Multimedia Cover to Improve Security and Capacity

Ashari I.F.a, Munir R.a

a School of Electrical Engineering and Informatics, Bandung Institute of Technology, Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2018 IEEE.Information is important asset, so it takes effort to maintain the confidentiality, integrity, and availability of information. Cryptography and steganography methods can be combined to improve information security. Steganography is divided into two types, Noisy Steganography and Noiseless Steganography. Noisy steganography has some disadvantages that can cause noise and the process of concealment that requires a container, while Noiseless Steganography (Nostega) will not produce noise and not require a container. One of the nostega paradigms is Graph Steganography (Graphstega). Graphstega is a technique that inserts messages as plotted data on a graph. This paper proposes a method that produces a graphstega encoding method that reduce the plot ratio gap, enhances data security by encrypting data, improve reality data with combination of excel cover, increasing message capacity without overlapping plots using (data splitting techniques, setting graphstega image resolution, setting font size on the graph plot), and implementing graphstega on text cover, digital image, and image hardcopy. The result of proposed graphstega method shows that it can improve data security, the value of the plot looks more realistic, reduce the plot ratio gap, increase message capacity, and can be implemented in text cover, image cover, and image hardcopy so the message distribution increases.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Data splitting,Digital image,Encoding methods,Font size,Message distribution,noiseless graphsteganography[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]cryptography,graph steganography,information security,noiseless graphsteganography,steganography[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICAITI.2018.8686741[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]