scholarly journals An Implementation of Audio Security Using DES Algorithm

Author(s):  
Abdul Wahid ◽  
Retantyo Wardoyo

AbstractData security is an important problem in computer technology. This paper discusses security system for audio data. This technology is crucial because the multimedia technology has been improved very fast. One of the common audio format forms is wave audio format. The wave format is an uncompressed file format which is for RIFF specification owned by Microsoft. It is used for saving multimedia file. By using DES algorithm, the wave data could be encrypted for hiding information contained in the data. DES algorithm is chosen in this research because DES algorithm is one of the best symmetrical cryptography algorithms and it has been used world wide. This research is expected to give contribution to the audio security concept, especially for audio data security using wave file format.Keywords : audio security, DES algorithm, wave Omar

2020 ◽  
Author(s):  
Dedy Agung Prabowo ◽  
Ujang Juhardi ◽  
Bambang Agus Herlambang

Recently, Information technology develops rapidly. It is possible for us to get some informationquickly, properly and efficiently. The information technology also has many advantages fo r people. Theneed for information is increasing according to the need of its users. This proves that informationtechnology can make our job easier and it can help us to save our time particularly for the job thatrelated to information and data processin g. With the increasing use of computer technology today, italso brings up some problems. One of them is security and confidentiality problem which is animportant aspect in an information system. Data security is an important thing in maintaining theconf identiality of particular data that only can be known by those who have right. RC6 is a symmetrickey algorithm which encrypts 128 bit plaintext blocks to 128 bit ciphertext blocks. The encryptionprocess involves four operations which is the critical arit hmetic operation of this block cipher. As alegal state, Indonesia has issued a regulation in a form of laws governing information and electronictransaction or commonly referred to UU ITE. Besides, Islam is a religion that comprehensively givesthe guidan ce of life for people. Islam has provided guidance in the various fields ranging from social,politics, economics and various other fields.


2014 ◽  
Vol 1023 ◽  
pp. 229-232
Author(s):  
Qing Chen

The development of science and technology and market offered more chances for applied technology in university library. And university library is necessary to utilize modern science and technology , advanced computer technology, high-density storage technology, multimedia technology, network technology, communication technology and information media to share documentary information resources with public. Only in this way can university library realize digitalization, networking and virtualization and applied technology is functioning adequately in jobs of university library.


2018 ◽  
pp. 218-233
Author(s):  
Mayank Yuvaraj

During the course of planning an institutional repository, digital library collections or digital preservation service it is inevitable to draft file format policies in order to ensure long term digital preservation, its accessibility and compatibility. Sincere efforts have been made to encourage the adoption of standard formats yet the digital preservation policies vary from library to library. The present paper is based against this background to present the digital preservation community with a common understanding of the common file formats used in the digital libraries or institutional repositories. The paper discusses both open and proprietary file formats for several media.


2019 ◽  
Vol 1237 ◽  
pp. 022010
Author(s):  
Yonggui Guo ◽  
Lina Cao ◽  
Xiao Gao ◽  
Xuming Lv
Keyword(s):  

2013 ◽  
Vol 756-759 ◽  
pp. 2428-2432
Author(s):  
Xiao Jing Zhu ◽  
Yuan Guai Lin

With the growing popularity of Web applications and Web attacks increasing; Web applications protection and data security have become the core focus of the information security system of enterprises and institutions. The paper briefly presents the harm of the common several kinds of Web attacks, and analyzes their principle, gives their defense measures. On this basis, the defense system of both software and hardware design is proposed. It achieves software defense design based on Web software development and Web application management, and hardware defense design based on H3C SecBlade IPS, to effectively guarantee the security of Web applications.


2021 ◽  
Vol 1 (1) ◽  
pp. 47-58
Author(s):  
S. Benzegane ◽  
S. Sadoudi ◽  
M. Djeddou

In this paper, we present a software development of multimedia streaming encryption using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate keystream for encrypting and decrypting real-time multimedia data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme through image and audio security analysis confirms its robustness against different kind of attacks.


2021 ◽  
Vol 93 (7s) ◽  
pp. 7-21
Author(s):  
Rino Bošnjak ◽  
◽  
Zvonimir Lušić ◽  
Filip Bojić ◽  
Dario Medić ◽  
...  

The common practice in world-wide ports is that they have determined procedures regarding number of required tugs depending usually on most important factors such as weather criteria and size of vessel. This article presents various rules for some ports which is defined in their Safety Management System and criteria in choosing optimum number of tugs and optimum bollard pull. It is also described how various towage requirements can be assessed through the use of maritime simulators and which parameters are important and how the same can be obtained and assessed. General guidelines will also be defined in the article which must be taken into consideration for optimal choosing of tug boats. The science method used in this article is known as comparative analyses between computation and simulation on simulator; results are presented in figure 10.


Author(s):  
Mohammed Hatem Ali Al-Hooti ◽  
Tohari Ahmad ◽  
Supeno Djanali

Sharp development progress of information technology has affected many aspects including data security. This is because classified data are often transferred between systems. In this case, data hiding exists to protect such data. Some methods which have been proposed, however, are not yet optimal concerning the amount of the secret and the quality of the resulted stego data. In this paper, we explore an audio file as the medium to carry the secret data which has been extracted into binary. Before the process begins, the cover is converted to binary and each sample’s bits are divided into two groups, one is used as the location of the embedded 4 bits whereas the second part locates the two bits that are randomly selected as the key. The experimental results have validated that the capacity is high and there is no much impact on the quality. Moreover, compared to the current LSB methods the security is exceedingly enhanced.


Author(s):  
Pratiksha Satapure

Abstract: Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vital information in a secret way. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, nonrepudiation. The security of communication is a crucial issue on World Wide Web. It is about confidentiality, integrity, authentication during access or editing of confidential internal documents. Keywords: Cryptography, Hill Cipher, Homophonic Substitution Cipher, Monoalphabetic Cipher, Ceaser Cipher.


Author(s):  
Niko Surya Atmaja ◽  
S Sumijan ◽  
Y Yuhandri

The common method used to secure a MySQL database is in access control. The technique is the use of a password. To better secure the data sent cryptographic techniques need to be done. This study uses the Elgamal method in conducting cryptography. The results of this study generate MySQL databases in random form during safer delivery and can only be accessed by parties who have a password. So this research can further improve MySQL data security


Sign in / Sign up

Export Citation Format

Share Document