Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : The Indonesian Journal of Computer Science

Enhancing Data Security: A Hybrid Approach of AI-Driven Steganography and Encryption Fadhil, Ammar
The Indonesian Journal of Computer Science Vol. 14 No. 2 (2025): The Indonesian Journal of Computer Science
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v14i2.4759

Abstract

In the era of technological development and the Internet, the volume of data transmitted in digital networks is constantly increasing. Ensuring data security has become one of the important challenges in our time. Encryption processes protect data security, but they are often exposed and attract attention. Steganography models are a technique that hides sensitive data but lacks cryptographic protection. The study proposes a hybrid security approach that combines encryption strength and data hiding to be secure against digital attacks. The proposed method takes advantage of one of the artificial intelligence techniques represented by deep learning, which depends on dynamically changing weights during encryption and embedding in the image. This allows us to obtain strong security and high imperceptibility. In the proposed approach, security is enhanced through several layers, the first of which is dynamic changes to generate random numbers and variable encryption as a result of the dynamics of the encryption key and finally hiding the data in a way that cannot be detected. The experimental results showed the merit of the proposed approach through the strength of the results such as the uniformity of the histogram peaks and high entropy = 8 and high imperceptibility represented by BSNR = 91dB. Our research contributes to enhancing data security and countering cyber attacks by exploiting artificial intelligence techniques. Future work has been proposed that opens up horizons for studies using other artificial intelligence techniques such as machine learning and improving real-time data processing in the digital network.
An Enhanced Model of the Wireless Multicarrier Communication OFDM Systems Applied on the FPGA Platform Based on Steganography system Y. Jaber, Ali; Fadhil, Ammar
The Indonesian Journal of Computer Science Vol. 14 No. 4 (2025): The Indonesian Journal of Computer Science
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v14i4.4891

Abstract

OFDM is a promising technology due to its robustness against multipath fading. Multipath fading distorts a signal propagating in free space due to destructive or constructive interference. The evolution of 5G wireless networks has necessitated the integration of high-throughput, low-latency multi-band modulation schemes, such as orthogonal frequency division multiplexing (OFDM), into real-time hardware-optimized platforms. However, challenges related to spectral efficiency, security, and the maximum-to-average power ratio (PAPR) remain, especially when these schemes are implemented on field-programmable gate arrays (FPGAs). Steganography offers increased information security. Therefore, this paper proposes an improved OFDM model for 5G that incorporates advanced data hiding techniques using steganography to embed secure image data within ORFDM subcarriers. The proposed system is implemented on an FPGA platform, leveraging high-speed pipelines and parallelism to achieve real-time performance at a minimal resource cost. Simulation and synthesis results demonstrate significant improvements in reduced PAPR, BER, and device efficiency compared to conventional OFDM applications. The FPGA platform design takes up approximately 20% of the total available space, with very low energy consumption compared to other traditional implementation methods. The results also showed an improvement in the OFDM system's performance by reducing the BER by 30%, indicating the absence of data loss and the effectiveness of the steganography technique in these systems. This results in improved architecture performance in terms of area, power, and speed. Furthermore, the proposed approach has proven its worth in terms of security and permeability.