scholarly journals Implementasi Pengamanan Citra Digital Menggunakan Algoritma ICE

2020 ◽  
Vol 1 (3) ◽  
pp. 284
Author(s):  
Josua Alfiandi Sinuhaji

Digital imagery is currently very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of digital images can be done by using cryptographic techniques. Cryptographic techniques can encode digital images by encrypting them in the form of passwords that are not understood. ICE is a block cipher published by Kwan in 1997. This algorithm has a structure similar to DES, but with additional bit permutations that do not depend on the key in the rotation function. There are various types of ICE variants, namely Thin-ICE, ICE standard, and ICE-n. The difference between the three is the length of the keyword used and the number of rounds. The Thin-ICE algorithm uses 64 bits and 8 turns. The ICE standard uses 64 bits and 16 round keys. The ICE-n algorithm uses keys 64n bits and 16n turns. The use of this type of algorithm can be adjusted to the needs of users where Thin-ICE has the lowest level of security among the three, while ICE-n is the highest. This algorithm does not become the subject of a patent and the source code can be used freely.Keywords : Cryptography, Digital Image,Algorithm,ICE.

2007 ◽  
Vol 1 (3) ◽  
pp. 357-380 ◽  
Author(s):  
PU Yi-Fei

This paper discusses the capabilities of the fractional differential approach for the detection of textural features in two-dimensional digital images and the involved Lateral Inhibition Principle, and fractional differential masks and algorithms of digital image. Firstly, the kinetic physical meaning of fractional differential and the relationship between fractional calculus and classical time-frequency analysis and the separability of two-dimensional fractional calculus on certain conditions are deduced. Secondly, the difference between two Gaussians receptive fields for fractional differential of digital image involved signal processing and biologic vision nerve model is discussed. An analysis of its Mach band is also included. Thirdly, the implements and parameters of eight n × n fractional differential masks, which are mutual central symmetric, on negative x-coordinate, positive x-coordinate, negative y-coordinate, positive y-coordinate, left lower diagonal, left upper diagonal, right lower diagonal, right upper diagonal respectively are discussed. Lastly, the numerical implementation algorithms of fractional differential mask for digital image are discussed. Numerical experiments show that the textural details enhance capabilities of fractional differential-based texture operator and are better than that of integral differential based one for rich-grained digital images.


2006 ◽  
Vol 31 (3) ◽  
pp. 25-31
Author(s):  
Caroline McBride

New Zealanders like to think of themselves as high users of the latest technology. Does this extend to digital imagery in the workplace? Curators at the Auckland Art Gallery Toi o Tāmaki were surveyed regarding digital image sources, their use and the problems and opportunities they presented. They were found to be keen, adept users, satisfied with their technical and retrieval capabilities, and aware of issues relating to copyright and image storage. Happy with thumbnails in many instances, they employed the skills of the Gallery’s professional photographers when higher quality images were required. Looking at the move from analogue to digital, slide use was found to be negligible but reproductions in books and journals were still a favoured source. Disadvantages were downplayed and the positive impact of digital imagery was stressed.


2018 ◽  
Author(s):  
Taronisokhi Zebua

Digital images of a private and confidential very extend to wiretapping by other parties, especially when the image is distributed over the internet. The tapping or misuse of the confidential private image, of course, harm the image owner. One technique to minimize the above measures is the utilization of cryptographic techniques. Cryptography techniques can secure digital images by modifying the image pixel values so that the resulting image is different from the original image. An RC4 algorithm can be used in realizing the purpose of cryptographic technique. But this algorithm has a weakness where the solving of this algorithm with know plaintext attack or know ciphertext only can be done easily. This research describes the security of digital images based on RC4 algorithm modification. The modification is to add an initial vector block in the process of encryption and decryption and shift a number of bits in a certain position. The result of this research is a digital image with pixel values that are much different from the original pixel value to make it difficult for others in manipulating the secret image


Author(s):  
Iryna Victorivna Brysina ◽  
Victor Olexandrovych Makarichev

In this paper, we consider the problem of digital image compression with high requirements to the quality of the result. Obviously, lossless compression algorithms can be applied. Since lossy compression provides a higher compression ratio and, hence, higher memory savings than lossless compression, we propose to use lossy algorithms with settings that provide the smallest loss of quality. The subject matter of this paper is almost lossless compression of full color 24-bit digital images using the discrete atomic compression (DAC) that is an algorithm based on the discrete atomic transform. The goal is to investigate the compression ratio and the quality loss indicators such as uniform (U), root mean square (RMS) and peak signal to noise ratio (PSNR) metrics. We also study the distribution of the difference between pixels of the original image and the corresponding pixels of the reconstructed image. In this research, the classic test images and the classic aerial images are considered. U-metric, which is highly dependent on even minor local changes, is considered as the major metric of quality loss. We solve the following tasks: to evaluate memory savings and loss of quality for each test image. We use the methods of digital image processing, atomic function theory, and approximation theory. The computer program "Discrete Atomic Compression: User Kit" with the mode "Almost Lossless Compression" is used to obtain results of the DAC processing of test images. We obtain the following results: 1) the difference between the smallest and the largest loss of quality is minor; 2) loss of quality is quite stable and predictable; 3) the compression ratio depends on the smoothness of the color change (the smallest and the largest values are obtained when processing the test images with the largest and the smallest number of small details in the image, respectively); 4) DAC provides 59 percent of memory savings; 5) ZIP-compression of DAC-files, which contain images compressed by DAC, is efficient. Conclusions: 1) the almost lossless compression mode of DAC provides sufficiently stable values of the considered quality loss metrics; 2) DAC provides relatively high compression ratio; 3) there is a possibility of further optimization of the DAC algorithm; 4) further research and development of this algorithm are promising.


Respati ◽  
2017 ◽  
Vol 12 (3) ◽  
Author(s):  
Faruk Alfiyan

INTISARISketching citra adalah sebuah proses pembuatan sketsa dari sebuah citra. Sketching citra digital adalah sesuatu yang sudah sangat familiar terutama dikalangan para seniman dan desainer. Saat ini sketching telah menjadi trend dalam berbagai bidang, mulai dari bidang pendidikan, film animasi hingga masuk ke ranah fashion. Dalam bidang ilmu citra digital proses sketching dapat dilakukan dengan menggunakan edge detection kirsch. Terdapat delapan jenis kernel yang dapat digunakan, dimana masing-masing kernel. Dalam penelitian ini akan dilakukan analasisa apakah perbedaan kernel tersebut juga akan mempengaruhi hasil sketching citra digitalDari hasil penelitian ini diharapkan akan dapat memberikan gambaran pada penelitian-peneltian selanjutnya terutama penelitian yang berhubungan dengan sketching citra digital sehingga hasil yang diperoleh dapat lebih maksimalKata kunci – Sketching, Edge, Detection,.Kirsch, Citra, Digital ABSTRACTSketching the image creation process is a sketch of an image  Digital image of Sketching is something that's already very familiar especially among artists and designers. Currently sketching has been a trend in many fields, ranging from education, animated films to enter into the realm of fashion.In the fields of digital imagery, the process of sketching can be done using edge detection kirsch. There are eight types of kernel that can be used, where each kernel. In this research analysis will be performed if the difference that kernel will also affect the results of the digital image of sketchingFrom the results of this research are expected to be able to give an overview on the research of next especially research related to digital image sketching so that the results obtained can be more optimallyKeywords– Sketching, Edge, Detection,.Kirsch, Citra, Digital


Author(s):  
D. P. Gangwar ◽  
Anju Pathania

This work presents a robust analysis of digital images to detect the modifications/ morphing/ editing signs by using the image’s exif metadata, thumbnail, camera traces, image markers, Huffman codec and Markers, Compression signatures etc. properties. The details of the whole methodology and findings are described in the present work. The main advantage of the methodology is that the whole analysis has been done by using software/tools which are easily available in open sources.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


2017 ◽  
Vol 1 (2) ◽  
pp. 137
Author(s):  
Noorlela Binti Noordin ◽  
Abdul Razaq Ahmad ◽  
Anuar Ahmad

This study was aimed to evaluate the Malay proficiency among students in Form Two especially non-Malay students and its relationship to academic achievement History. To achieve the purpose of the study there are two objectives, the first is to look at the difference between mean of Malay Language test influences min of academic achievement of History subject among non-Malay students in Form Two and the second is the relationship between the level of Malay proficiency and their academic achievement for History. This study used quantitative methods, which involved 100 people of Form Two non-Malay students in one of the schools in Klang, Selangor. This study used quantitative data were analyzed using descriptive statistics and statistical inference with IBM SPSS Statistics v22 software. This study found that there was a relationship between the proficiency of Malay language among non-Malay students with achievements in the subject of History. The implications of this study are discussed in this article.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


Sign in / Sign up

Export Citation Format

Share Document