IJMSC Vol. 6, No. 1, 8 Feb. 2020
Cover page and Table of Contents: PDF (size: 254KB)
Full Text (PDF, 254KB), PP.1-9
Views: 0 Downloads: 0
RGB Shuffling, Cryptography, Steganography, Securing Digital Data
The recent advance in information technology field forcing us to ensure the privacy of the digital data. It is very important to develop the method that may satisfy the needs. Many methods/techniques applied to reach that goal. One of efficient way to reach that secrecy can be achieved by combining Cryptography and Steganography. In this paper, a new RGB shuffling method proposed. The concept of encryption using RGB Shuffling is shuffling all of RGB element to distort the image. RGB Shuffling method will shuffle the RGB each pixel of image depends on the input password from user. The basic step of RGB shuffling is adding RGB element with ASCII password, invers and shuffle it.
Rosalina, Nur Hadisukmana," An Approach of Securing Data using Combined Cryptography and Steganography ", International Journal of Mathematical Sciences and Computing(IJMSC), Vol.6, No.1, pp.1-9, 2020. DOI: 10.5815/ijmsc.2020.01.01
[1] Rizki, Ramadhan. CNN Indonesia. CNN Indonesia. [Online] 7 17, 2018. [Cited: 05 22, 2019.] https://www.cnnindonesia.com/nasional/20180717140856-12-314780/polri-indonesia-tertinggi-keduakejahatan-siber-di-dunia.
[2] Abdulzahra, Hayfaa, Ahmad, Robiah and Noor, Norliza Mohd "Combining Cryptography and Steganography for Data Hiding in Images" Applied Computational Science,2014, pp. 128-134.
[3] Poduval, Aditya, et al. "Secure File Storage on Cloud using Hybrid Cryptography" International Journal of Computer Science and Engineering, 2019, Vol. 7.
[4] Garg, Nancy and Kaur, Kamalinder. "Hybrid Information Security Model for Cloud Storage Systems using Hybrid Data Security Scheme", 2016, Vol. 3.
[5] Rahman, Mohammad Obaidur, et al. "An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E-LSB Encoding Techniques" International Journal of Computer Science and Network Security, 2018, Vol. 18, pp. 85-93.
[6] Navita Agarwal, Prachi Agarwal “An Efficient Shuffling Techniques on RGB Pixels for Image Encryption”, MIT International Journal of Computer Science & Information Technology, 2013, Vol. 3, No. 2, pp. 77-81
[7] Quist-Aphetsi Kester, MIEEE “Image Encryption based on the RGB Pixel Transposition and Shuffling” International Journal Computer Network and Information Security, 2013, No.7 pp. 43-50
[8] Londhe Swapnali, Jagtap Megha, Shinde Ranjeet, P.P. Belsare and Gavali B. Ashwini “ A Cyrptographic Key Generation on a 2D Graphics using RGB Pixel Shuffling and Transposition” Proceedings of the International Conference on Data Engineering and Communication Technology, Advances in Intelligent Systems and Computing 469, 2016, Vol. 2, Springer
[9] Sanjay Kumar Pal, Sumeet Anand,"Cryptography Based on RGB Color Channels using ANNs", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.5, pp.60-69, 2018
[10] Aumreesh Kumar Saxena, Sitesh Sinha, Piyush Shukla," Design and Development of Image Security Technique by Using Cryptography and Steganography: A Combine Approach", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.10, No.4, pp. 13-21, 2018
[11] Hnin Lai Nyo, Aye Wai Oo, "Secure Data Transmission of Video Steganography Using Arnold Scrambling and DWT", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.6, pp.45-53, 2019
[12] Jaeyoung Kim; Hanhoon Park; Jong-Il Park “Image steganography based on block matching in DWT domain” IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Page(s):1 – 4, Italy 2017
[13] M. Saritha; Vishwanath M. Khadabadi; M. Sushravya “Image and text steganography with cryptography using MATLAB” International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES) page(s): 584-587, India-2016.
[14] Nikhil Patel; Shweta Meena “LSB based Image steganography using Dynamic key cryptography” 2016 International Conference on Emerging Trends in Communication Technologies (ETCT), Pages(s): 1- 5,India-2016
[15] Baboon-image. Retrieved from https://www.npmjs.
[16] Retrieved from http://www.stefaneberube.com/