2017
DOI: 10.1088/1742-6596/930/1/012003
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Multiple Data Hiding Combined Coloured Visual Cryptography and LSB

Abstract: Abstract. Currently the level of data security becoming a major factor in data transfer. As we know every process of sending data through any medium the risk of that data gets hacked will still be there. Some techniques for securing data such as steganography and cryptography also often used as a solution for securing data. But it does not last long because it has been fou out the weaknesses of the algorithm so that the security be assured. So, in need of variety of new algorithms to be able to protect the dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
(3 reference statements)
0
2
0
Order By: Relevance
“…The LSB technique works by changing the least significant bit, in a greyscale image, generally the eighth bit, to a bit of the secret message. An 800×600 pixel image can theoretically store up to 1,440,000 bits or 180,000 bytes of embedded data [21]. An 8-bit grayscale image also needs 8 pixels for the embedding process.…”
Section: Applying Lsbmentioning
confidence: 99%
“…The LSB technique works by changing the least significant bit, in a greyscale image, generally the eighth bit, to a bit of the secret message. An 800×600 pixel image can theoretically store up to 1,440,000 bits or 180,000 bytes of embedded data [21]. An 8-bit grayscale image also needs 8 pixels for the embedding process.…”
Section: Applying Lsbmentioning
confidence: 99%
“…To solve this problem, the K-Means++ algorithm applies a centroid spread (cluster center). Therefore, in this study the author will apply the K-Means ++ algorithm to classify the data on the results of the learning evaluation and it is hoped that this research can map the results of the learning evaluation well (Maulana, 2017).In this study, an analysis of the results of online learning conducted in the Information Systems Study Program, Faculty of Computer Science and Information Technology, UMSU will be carried out. Based on this description, the title of this study was drawn "Analysis of the Effectiveness of Online Learning Using Eda Data Science and Machine Learning" So that it is hoped that by applying this it will produce a data insight that can be used to improve the quality of the learning process at Universitas Muhammadiyah Sumatera Utrara in particular the Information Systems Study Program.…”
Section: Introductionmentioning
confidence: 99%