Multi-Layers Of Data Security System :, Encrypted Image In Image Steganography

2015 ◽  
pp. 15
Author(s):  
Mustafa Dhiaa Al-Hassani
2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Author(s):  
Md. Ashiqul Islam ◽  
Aysha Akter Kobita ◽  
Md. Sagar Hossen ◽  
Laila Sultana Rumi ◽  
Rafat Karim ◽  
...  

2000 ◽  
Vol 6 (1_suppl) ◽  
pp. 160-161 ◽  
Author(s):  
Peter Sögner ◽  
Klaus Goidinger ◽  
Dietmar Reiter ◽  
Alfons Stoeger ◽  
Dieter Zur Nedden

We assessed a data security system using biometric fingerprint techniques and smartcards to control access to a teleradiology system. Clinical cases were initially discussed between the referring physician and radiologist in Tyrol using a video-phone. Subsequent correspondence, including the transmission of images between the referring physician and the radiologist, was carried out by email using the security system to prevent unauthorized access to patient information. Seventy-eight teleradiology sessions were conducted using this data security system. Speed and stability of data exchange were unaffected by the additional security feature. The average log-on time to the system was 7.8 s. The average training time on how to use the system was 15 min. The radiologist was able to issue a final patient report using the system within 1.5 of the initial contact. The data security feature was user-friendly and did not hinder the normal teleradiology consultation.


Author(s):  
Suci Ramadani ◽  

The development of technology at this time allows everyone to exchange information without any limitation of time and distance. The possibility that data leakage will occur during the process of exchanging information is carried out, therefore in sending data especially images, security aspects, confidentiality and efficiency of data storage is very necessary. If the important information falls into the wrong hands, it will cause unwanted things, for example manipulation of images with negative shapes and can harm the owner of the image. One method used to maintain data security is cryptography using one of the techniques, Elgamal. The strength of this algorithm lies in the difficulty of calculating discrete algorithms on prime integers in which multiplication operations are performed. In this research, the writer combines Hill Cipher to do image encryption and Elgamal Algorithm to decrypt the key of Hill Cipher. The image is first encrypted using the Hill Cipher, then the Hill Cipher key is encrypted using the Elgamal Algorithm. The implementation of the system uses the programming language Visual Basic Net 2010. The results of the implementation with the initial encrypted image has 4282.85 milliseconds with random images, while the encrypted image will be re-described as having 20442.84 milliseconds with the image returned to the beginning.


Sign in / Sign up

Export Citation Format

Share Document