scholarly journals Sistem Kriptografi Citra Digital Pada Jaringan Intranet Menggunakan Metode Kombinasi Chaos Map Dan Teknik Selektif

2017 ◽  
Vol 9 (1) ◽  
pp. 59-66 ◽  
Author(s):  
Arinten Dewi Hidayat ◽  
Irawan Afrianto

Many organizations use design applications to draw the products they create. The drawings are digital files that have various formats of type and size. The images sometimes have to be protected because they are secret designs, such as the design of military vehicles, weapons and other designs. In order to secure digital data, cryptography is one of the solution, including if the data to be secured in the form of digital images. Algorithms that can be used to perform cryptography in digital image one of them is chaos map using Arnold cat map, logistics map and application of selective technique. Chaos was chosen for three reasons: sensitivity to initial conditions, random behavior, and no repetitive periods. While the application of selective technique means only encrypt some elements in the image but the effect of the whole image is encrypted. Cryptography in the image is also implemented because the organization using an intranet network to deliver its design drawings from one division to another. This allows for data tapping or exploitation of digital images while inside the intranet network. So it is necessary to develop a cryptographic system on the intranet network that has the ability to secure digital images that are in the network. The results obtained from black box testing, white box and network security testing show that the built system has been able to secure digital images when sent over the organization's intranet network. Index Terms—Cryptography, Image, Chaos Map Algorithm, Selective Technique, Intranet.

2019 ◽  
Vol 8 (2) ◽  
pp. 5139-5146

The advancements in internet and 5G communication technologies enormously use images as a crucial element for effective digital communication. Most of the digital devices support image communication as a prominent way of communication in digital Era. Most of the unauthorized access of digital Era communications leads to serious issues in digital data or digital image communications. Hence, Image Security in digital communication becomes an egress area of research in Digital Era. This paper is to design and implement an algorithm with a 96 bits cryptographic system. The result analysis carries out in this paper on input images and presents the comparative analysis of our proposed algorithm with the standard algorithms through standard performance evaluation metrics.


Author(s):  
Jasmine Jolly ◽  
Mehbooba P Shareef

The growth of internet and its reachability to all sectors of people have never been greater. Internet has become the best marketplace, the best library and may be the best guide for everything. But this revolution comes with some bigger problems. One of the most challenging problems among them would be copyright protection of digital data being transferred over internet. Digital images, videos and audios undergo illegal re-production and re-distributions, tampering and other acts of copyright violation. This is proved to have leading the film and other prominent industries to loss of millions of dollars per year. Encrypting the data provides security to it. In this case only people who pay to buy the secret key that should be used for decryption can use the data. But the problem is that once decrypted, the data can be re-produced into any number of copies and can be re-distributed without any permission from the author. Watermarking is an intelligent solution for this problem where the presence of watermark can be checked to distinguish pirated copies from the actual ones. A lot of methods have been developed for image and video watermarking, but the research on audio watermarking started a little bit later. The reason might be the fact that audio watermarking is tedious compared to image and video as Human Auditory System (HAS) is more sensitive compared to Human Visionary System. So ensuring the imperceptibility of audio watermarks is a tougher task. In this thesis various audio watermarking schemes introduced so far in the literature and their merits and demerits are studied.


2018 ◽  
Vol 2018 ◽  
pp. 1-20 ◽  
Author(s):  
Amir Anees ◽  
Iqtadar Hussain ◽  
Abdulmohsen Algarni ◽  
Muhammad Aslam

The protection of copyrights of digital media uploaded to the Internet is a growing problem. In this paper, first, we present a unified framework for embedding and detecting watermark in digital data. Second, a new robust watermarking scheme is proposed considering this concern. The proposed work incorporates three chaotic maps which specify the location for embedding the watermark. Third, a new chaotic map, the Extended Logistic map, is proposed in this work. The proposed map has a bigger range than logistic and cubic maps. It has shown good results in a bifurcation, sensitivity to initial conditions, and randomness tests. Furthermore, with the detailed analysis of initial parameters, it is justified that Extended Logistic map can be used in secure communication, particularly watermarking. Fourth, to check the robustness of proposed watermarking scheme, we have done a series of analyses and standard attacks. The results confirm that the proposed watermarking scheme is robust against visual and statistical analysis and can resist the standard attacks.


2012 ◽  
Vol 2 (4) ◽  
Author(s):  
Björn Zakrisson ◽  
Hans-Áke Häggblad ◽  
Pär Jonsén

AbstractA detonating explosive interacting with a deformable structure is a highly transient and non-linear event. In field blast trials of military vehicles, a standard procedure is often followed in order to reduce the uncertainties and increase the quality of the test. If the explosive is buried in the ground, the state of the soil must meet specific demands. In the present work, laboratory experiments have been performed to characterize the behaviour of a soil material. Soil may be considered a three-phase medium, consisting of solid grains, water and air. Variations between the amounts of these phases affect the mechanical properties of the soil. The experimental outcome has formed input data to represent the soil behaviour included in a three-phase elastic-plastic cap model. This unified constitutive model for soil has been used for numerical simulations representing field blast trials, where the explosive load is interacting with a deformable structure. The blast trials included explosive buried at different depths in wet or dry sand. A dependence of the soil initial conditions can be shown, both in the past field trials along with the numerical simulations. Even though some deviations exist, the simulations showed in general acceptable agreement with the experimental results.


2019 ◽  
Vol 11 (4) ◽  
pp. 122-130
Author(s):  
RaildoSantos de Lima ◽  
Fábio Roberto Chavarette ◽  
Luiz Gustavo Pereira Roéfero Roéfero

Based on the Hindmarsh-Rose (RH) neuronal model for nerve impulse transmission, this paper aims to study the properties and dynamic behavior of the non-linear chaotic system that describes neuronal bursting in a single neuron. On the part of bioengineering, there is great motivation in the study of the HR model because it is well representative of the biological neuron, being able to simulate several behaviors of a real neuron, among them periodic, aperiodic and chaotic behavior. The literature suggests that the chaotic behaviorrepresents in the human being the epileptic or convulsive state. Through computer simulations, considering the system parameters, it was analyzed that the stability is highly sensitive to the initial conditions and producing oscillations, more so, when the oscillation increases the random behavior tends to increase making the system unpredictable.


1976 ◽  
Vol 74 (2) ◽  
pp. 209-250 ◽  
Author(s):  
F. H. Champagne ◽  
Y. H. Pao ◽  
I. J. Wygnanski

An experimental investigation of the two-dimensional incompressible mixing layer was carried out. The measurements provide new information on the development of the mean and turbulent fields towards a self-preserving state and on the higher-order statistical characteristics of the turbulent field. The relevance of initial conditions to the development of the flow is discussed in the light of both present and previous data. Measurements of spectra, probability densities and moments to eighth order of all three velocity-component fluctuations at various transverse positions across the flow were carried out using an on-line digital data acquisition system. The probability density distributions of the derivative and the squared derivative of the longitudinal and lateral velocity fluctuations were also determined. Direct measurements of moments to eighth order of the velocity derivatives were attempted and are discussed in the light of the simultaneously measured histograms. The problems in obtaining higher-order statistical data are considered in some detail. Estimates of the integral time scale of many of the higher-order statistics are presented. The high wave-number structure was found to be locally anisotropic according to both spectral and turbulent velocity-gradient moment requirements. Higher-order spectra to fourth order of the longitudinal velocity fluctuations were measured and are discussed. Finally the lognormality of the squared longitudinal and lateral velocity-derivative fluctuations was investigated and the universal lognormal constant μ was evaluated.


2018 ◽  
Vol 1 (2) ◽  
pp. 33-40
Author(s):  
Laith Abdulhussien Hamood ◽  
Mahmood Khalel Ibrahem

the huge development and use of digital multimedia (video, image) over computer networks has led to increase the need for securing of these digital data. Video encryption is widely used as a method for providing security for digital video. In this paper video encryption method is developed using chaotic system for key generator and stream cipher, it uses chaotic map as one-time key generator which produce key used for encryption process. Chaotic systems have been successfully used for multimedia encryption. Chaotic cryptography have good characteristic such as pseudo-randomness, and sensitivity to initial conditions. Video encryption method have successfully designed and implemented, the tests and analysis results have showed the succeed of the encryption method in term of speed and security.


Author(s):  
Upa Yuandari

Image is a representation (picture), similarity, or imitation of an object. The use of digital images plays an important role as a form of information due to its advantages. Although it is rich in information, not all images have a good visual appearance. This can be due to interference in the form of noise, color intensity that is too contrasting or blurred. Noise itself is a disturbance caused by distorted digital data received by the image data receiver, starting from the movement during shooting by optical devices such as cameras, the use of optical devices that are not in focus, short lighting thereby reducing the number of photos captured by optical devices, or the weather when shooting. Noise can be removed by using the Image Averaging Method 


2018 ◽  
Vol 57 (1) ◽  
pp. 38-61
Author(s):  
Hyo Yoon Kang

This article examines the shifts in the material ordering of inventions in patent law organization and their effects on the meaning and scope of inventions as intellectual property. Formats and media are constitutive of the establishment and stabilization of inventions as objects of intellectual property. Modern patent law’s materiality had been dominated by paper documents but ever more consists of digital images, files, and networked data. The article traces and analyzes such effects of digital media on the meaning of intellectual/intangible property and argues that inventions increasingly matter as digital data in the legal realm.


2021 ◽  
Vol 3 (2) ◽  
pp. 129-143
Author(s):  
Amal Hameed Khaleel ◽  
Iman Q. Abduljaleel

In recent decades, image encryption has been a popular and important field of research. The image encryption techniques have been studied thoroughly to ensure the safety of digital images on transmission through the networks. A large range of algorithms for chaotic-based cryptographic systems has been suggested and submitted to enhance the efficiency of the encryption methods. The chaotic map is one technique to guarantee security. The benefits of chaotic image encryption include the fact that it is simple to implement; it has a faster encryption speed, and it is powerful against attacks. Due to their extreme sensitivity to initial conditions, unpredictability, and random-like behaviours, many image encryption systems using chaotic maps have been proposed. This study paper presents a scientific review of many types of researches during the (2014-2020) years that used chaotic with its various types (one-dimensional, multi-dimensional, or hyper-chaotic) to process the digital images in the encryption stage or the scrambling phase. Furthermore, it presents a future reading of researches that has a wider role in developing the cryptography field by improving the efficiency of Algorithms where using a chaotic map with other methods gives better results than using chaotic alone in scrambling and encryption methods.


Sign in / Sign up

Export Citation Format

Share Document