scholarly journals Implementation Gifford Method For Digital Image Security

Author(s):  
Fauduziduhu Laia ◽  
Erwin Panggabean

Rapid development of digital image technology secret causes images require security aspect. Reviews These digital secret image can be encrypted using cryptographic methods. After being encrypted, the image is randomized, so that if it is Obtained by an unauthorized party, the image has no meaning. The cryptographic algorithm used in this study is Gifford method. The Gifford method is a stream cipher, a symmetry encryption algorithm that transforms the data character by character. Gifford has 8 registers filled with key bits. The processes performed by the Gifford method are the Output Function process, the 1-bit Sticky Shift Right process, the 1-bit Left Shift process, the XOR operation and the shift register operation to the right. The decryption process must use the same key as the encryption process in order to Obtain the original image.

Author(s):  
Miftah Sigit Rahmawati ◽  
Rendra Soekarta

Chryptography or Chriptology plays an important role in building data and information security. Chryptography aims to not read unauthorized people, so information can be safely maintained. Some research about Chryptography and algorithms related to data security have been done by practitioner of informatics and mathematic, one of which is DES algorithms and wavelet transform. DES algorithm is symmetrical standart algorithm which is widely used and is still considered safe to answer th challenges of the rapid development of information technology.This paper have discussed about application of Algebra in DES algorithms and discrete Wavelet Transform On Digital Image Security Application, i.e. XOR operation, permutation, and  permutation group or siklik group which is used in DES algorithms on digital image security application. Then, as Group it found (x+b)-group  in discrete wavelet transform on digital image security application


Author(s):  
Xing-Yuan Wang ◽  
Zhi-Ming Li

AbstractIn this paper, a new chaotic image encryption scheme is proposed, which uses the combination of stream cipher and block cipher to spread and then uses the Logistic mapping matrix to perform the block sort transformation to complete the confusion. The specific method is as follows: First, perform the triple XOR operation, non-linear S-box transformation and linear cyclic shift transformation on the key. Second, the triple XOR operation of the transformed key and the plaintext and Logistic mapping sequence are used to obtain the semi-ciphertext. And set the obtained semi-ciphertext and plaintext as key components of the next round of encryption. Finally, the transformation of sorting and partition of the Logistic mapping matrix are used to confuse the semi-ciphertext. The experimental results show that the proposed algorithm improves the encryption efficiency, has good security and can resist common attacks.


2019 ◽  
Vol 7 (2) ◽  
Author(s):  
Reka Indriani ◽  
Mesiono Mesiono ◽  
Sapri Sapri

<p><em>When children are in a process of growth and rapid development, parents and young people should pay atantion to the health and health of children so that the children can grow and develop according to their age.The purpose of this research is to identify: (1). The children nutrition 5-6 years old, (2). The children health development 5-6 years old, (3). The alternative to protect children health. This research is a quantitative descriptive research. The participants of this research which are include the principal, teacher, and the student parents at class B who is 5-6 years old. In process of collecting the data the researcher used interview method, observation, and documentation. From the research we can conclude 1).Nutrition or food that often given to the children is just four healthy five perfect foods, 2).The children in TK Ummi are the children who have healtiness, 3). The alternative that can be commited to protect the children health is do the practice, make the children common to throw the rubbish in the right place,  check the children nail, stock the pure water, set many dustbins and make a common to wash their hand before eating.</em></p>


2012 ◽  
Vol 546-547 ◽  
pp. 410-415
Author(s):  
Chun Ge Tang ◽  
Tie Sheng Fan ◽  
Lei Liu ◽  
Zhi Hui Li

A new blind digital watermarking algorithm based on the chain code is proposed. The chain code is obtained by the characteristics of the original image -the edge contour. The feather can reflect the overall correlation of the vector image, and chain code expression can significantly reduce the boundary representation of the amount of data required. For the watermarking embedding, the original vector image is divided into sub-block images, and two bits of the watermarking information are embedded into sub-block images repeatedly by quantization. For watermarking extracting, the majority decision method is employed to determine the size of the extracted watermark. Experimental results show that the image quality is not significantly lowered after watermarking. The algorithm can resist the basic conventional attacks and has good robustness on the shear attacks.


Author(s):  
Muhammad Syahputra Nasution ◽  
Nurul Fadillah

Abstrak— Buah tomat merupakan salah satu buah yang memiliki warna yang kompleks untuk menentukan kematangan nya. Buah tomat memiliki 3 warna untuk menentukan apakah buat tomat tersebut sudah matang, setengah matang, dan mentah, yaitu warna merah ketika buah tomat sudah matang, warna kuning ketika buah tomat setengah matang, dan warna hijau ketika buah tomat mentah. Untuk menentukan kematangan buah tomat tersebut tidak hanya dilakukan secara konvensional (manual), tetapi bisa juga dapat dilakukan secara komputing (berbasis teknologi). Salah satu metode yang tepat untuk menentukan kematangan buah tomat berdasarkan warnanya secara komputing, yaitu menggunakan metode YCbCr. Pada penelitian ini akan dilihat bagaimana hasil konversi RGB ke YCbCr untuk menentukan kematangan pada buah tomat. Hasil yang didapat pada penelitian ini, yaitu ketika citra asli (RGB) di konversikan ke citra YCbCr maka untuk warna buah tomat yang sudah matang akan berwarna ungu, untuk warna buah tomat setengah matang akan berwarna berwarna magenta, dan untuk warna buah tomat yang masih mentah akan berwarna merah. Abstract— Tomato fruit is one of the fruits that has a complex color to determine its maturity. Tomatoes have 3 colors to determine whether the tomatoes are ripe, half-cooked and raw, which is red when the tomatoes are ripe, yellow when the tomatoes are half cooked, and green when the tomatoes are raw. To determine the maturity of tomatoes is not only done conventionally (manually), but can also be done by computing (technology-based). One of the right methods to determine the maturity of tomatoes based on the color is computationally, using the YCbCr method. In this study we will see how the results of RGB conversion to YCbCr to determine the maturity of tomatoes. The results obtained in this study, namely when the original image (RGB) is converted to YCbCr images, then for the color of ripe tomatoes will be purple, for the color of half-ripe tomatoes will be colored magenta, and for the color of tomatoes that are still raw will be red.


2018 ◽  
Vol 2 (2) ◽  
pp. 175-195
Author(s):  
Raghad Yousif ◽  
Ayad Ismaeel

This paper presents a novel image encryption scheme based on extended largescale randomization key-stream generator. The basic form of the key-stream generator is presented, and employed in digital image ciphering. The modification of the basic form also, presented, and gives encouraging results in image encryption as compared with classical non-linear stream cipher generators and the basic form. Pixel shuffling is performed via vertical and horizontal permutation. Shuffling is used to expand diffusion in the image and dissipate high correlation among image pixels the sequences generated from all presented generators are introduced to five well-known statistical tests of randomness to judge their randomness characteristic. The ciphered images are tested for their residual intelligibility subjectively. The measures applied to images ciphered by one of the classical key-stream cipher generators (Threshold generator) for the purpose of comparison with the presented key-stream algorithms. Experiments results show that the proposed algorithm achieves the image security. In order to evaluate performance, the proposed algorithm was measured through a series of tests. Experimental results illustrate that the proposed scheme shows a good resistance against brute-force and statistical attacks


2021 ◽  
Vol 40 (3) ◽  
pp. 155-168
Author(s):  
D. G. Diachenko

The paper is devoted to the Raiky culture in the Middle Dnieper. It reveals major issues of the phenomenon of Raiky culture and their possible solutions considering the achievements of Ukrainian archeologists in this field. The genesis, chronology and features of the development of material culture of the Raiky sites in the 8th—9th centuries of the right-bank of the Dnieper are analyzed. In general the existence of the Raiky culture in the Middle Dnieper region can be described as follows. It was formed in first half of the 8th century in the Tiasmyn basin. The first wheel-made pottery has begun to manufacture quite early, from the mid-8th century (probably at the beginning of the third quarter). At the first stage, the early vessels have imitated the hand-made Raiky forms as well as the Saltovo-Mayaki imported vessels. Significant development of the material culture occurs during the second half of the 8th century. At the same time, the movement of the people of Raiky culture and the population of the sites of Sаkhnivka type has begun in the northern direction which was marked by the appearance of the Kaniv settlement, Monastyrok, and possibly Buchak. This stage is characterized by the syncretism both in the ceramic complex and in the features of design of the heating structures. Numerous influences of the people of Volyntsevo culture (and through them – of Saltovo-Mayaki one) are recorded in the Raiky culture. It is observed not only in direct imports but also in the efforts of the Raiky population to imitate the pottery of Volyntsevo and Saltovo-Mayaki cultures, however, based on their own technological capabilities. The nature of the relationship between the bearers of these cultures is still interesting. The population of Raiky accepts the imported items of Saltovo-Mayaki and Volyntsevo cultures, tries to imitate high-quality pottery of them, and even one can see the peaceful coexistence of two cultures in one settlement — Monastyrok, Buchak, Stovpyagy. However, the reverse pulses are absent. There are no tendencies to assimilate each other. Although, given the number and size of the sites, the numerical advantage of the Volyntsevo population in the region seems obvious. There is currently no answer to this question. The first third of the 9th century became the watershed. The destruction of the Bytytsia hill-fort and the charred ruins to which most of the settlements of the Volyntsevo culture has turned, is explained in the literature by the early penetration of Scandinavians into the region or as result of the resettlement of Magyars to the Northern Pontic region. In any case, this led to a change in the ethnic and cultural situation in the Dnieper basin. According to some researchers, the surviving part of the population of Volyntsevo culture migrated to the Oka and Don interfluve. For some time, but not for long, the settlements of Raiky culture remained abandoned. Apparently, after the stabilization of situation, the residents have returned which is reflected by the reconstruction of the Kaniv settlement and Monastyrok; in addition, on the latter the fortifications have been erected. The final stage of the existence of culture is characterized by contacts with the area of the left bank of Dnieper, the influx of the items of the «Danube circle», as well as the rapid development of the forms of early wheel-made pottery. The general profiling of vessels and design of the rim became more complicated, the rich linear-wavy ornament which covers practically all surface of the item became characteristic. This suggests the use of a quick hand wheel which has improved the symmetry of the vessels, as well as permitted to create the larger specimens. The evolution of the early wheel-made ceramic complex took place only by a variety of forms, however, technological indicators (dough composition, firing, density and thickness of vessel walls) indicate the actual invariability and sustainability of the manufacture tradition. The discontinuance of the functioning of the latest Raiky sites (Monastyrok and Kaniv settlements) can be attributed as the consequences of the first stages of consolidation of the Rus people in the Middle Dnieper dating to the late 9th — the turn of the 9th—10th centuries.


2019 ◽  
Vol 7 (4) ◽  
pp. 254
Author(s):  
Nada E. Tawfiq

Image files can hide text without their size being affected too much. This process called steganography which allows hiding text in images without any suspicions from intruders. This paper addresses an improved LSB substitution algorithm for hiding Kurdish text information written in text file into digital image as steganography technique. The algorithm consists of two main phases, the first phase holds the encryption of the Kurdish text message and the embedded technique while the second phase hold the message extraction followed by decryption to get the original code of each character. The algorithm contains many procedures to enhance this process. Least Significant Bit method is used to hide the Kurdish text, in order to keep the features and characteristics of the original image. Applying the proposed approach shows that it seems work in a best case by hiding and retrieving text from the digital image which is used as a carrier of this text. Delphi 2010 was used to simulate both encrypt-embedded phase and extract-decrypt phase, and the results were obtained with high and security which proved the efficiency of the algorithm, where the hidden Kurdish text didn’t make any distortion or change over the cover image.


2019 ◽  
Vol 14 (10) ◽  
pp. 87 ◽  
Author(s):  
Arshia Taimouri ◽  
Korosh Emamisaleh ◽  
Davoud Mohammadi

Following the rapid development of the Internet, e-commerce websites are widely used today for various goals. An essential point in the prosperity of these websites is their level of usability. Accordingly, measuring this usability is indispensable for these websites to check whether they are moving in the right path. Thus, in this article, the usability scores of five well-known online food-ordering websites in Iran have been evaluated using a novel fuzzy Kano method with respect to design parameters. In addition to assessing usability scores, the design parameters of these websites have been classified and reviewed in a detailed manner in order to determine the design priorities of these websites as one of the main results of this study. Data were gathered using a questionnaire with 190 respondents. Results demonstrated that Snappfood is the best online food-ordering website in Iran. In addition, sorting restaurants based on customer satisfaction score, using high-quality images of foods along with the image zooming feature, and the existence of complete information about foods and restaurants are the most effective and important design parameters of these types of websites according to the findings of this study.


Sign in / Sign up

Export Citation Format

Share Document