1982 ◽  
Author(s):  
Betty P. Chao ◽  
Robert J. Beaton ◽  
Harry L. Snyder
Keyword(s):  

2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


2000 ◽  
Vol 43 (6) ◽  
pp. 1927-1938 ◽  
Author(s):  
C. Yang ◽  
J. H. Everitt ◽  
J. M. Bradford ◽  
D. E. Escobar

1995 ◽  
Vol 9 (3) ◽  
pp. 477-483 ◽  
Author(s):  
Hubert W. Carson ◽  
Lawrence W. Lass ◽  
Robert H. Callihan

Yellow hawkweed infests permanent upland pastures and forest meadows in northern Idaho. Conventional surveys to determine infestations of this weed are not practical. A charge coupled device with spectral filters mounted in an airplane was used to obtain digital images (1 m resolution) of flowering yellow hawkweed. Supervised classification of the digital images predicted more area infested by yellow hawkweed than did unsupervised classification. Where yellow hawkweed was the dominant ground cover species, infestations were detectable with high accuracy from digital images. Moderate yellow hawkweed infestation detection was unreliable, and areas having less than 20% yellow hawkweed cover were not detected.


2004 ◽  
pp. 753-760
Author(s):  
R Weichert ◽  
M Wickenhäuser ◽  
G Bezzola ◽  
H Minor

2021 ◽  
Author(s):  
Adrian Bender

Expanded methods for discharge and grain size estimation; access information for digital imagery and elevation data; precipitation and discharge data; and field data collected during this study.


2020 ◽  
Vol 1 (3) ◽  
pp. 284
Author(s):  
Josua Alfiandi Sinuhaji

Digital imagery is currently very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of digital images can be done by using cryptographic techniques. Cryptographic techniques can encode digital images by encrypting them in the form of passwords that are not understood. ICE is a block cipher published by Kwan in 1997. This algorithm has a structure similar to DES, but with additional bit permutations that do not depend on the key in the rotation function. There are various types of ICE variants, namely Thin-ICE, ICE standard, and ICE-n. The difference between the three is the length of the keyword used and the number of rounds. The Thin-ICE algorithm uses 64 bits and 8 turns. The ICE standard uses 64 bits and 16 round keys. The ICE-n algorithm uses keys 64n bits and 16n turns. The use of this type of algorithm can be adjusted to the needs of users where Thin-ICE has the lowest level of security among the three, while ICE-n is the highest. This algorithm does not become the subject of a patent and the source code can be used freely.Keywords : Cryptography, Digital Image,Algorithm,ICE.


Sign in / Sign up

Export Citation Format

Share Document