Abstract:<span>Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The main objective of this study is explore the capabilities of secured data that used widely by researchers. Furthermore, the benefits and the drawbacks for each of secured data domain are also studied. This paper concludes that cr… Show more
“…Experiments in Table 8, using samples of different numbers of strings, show that the running time required for the decryption process is longer than the encryption process. The application of the hybrid TELKOMNIKA Telecommun Comput El Control Improvement security in e-business systems using hybrid algorithm (L Sumaryanti) 1541 algorithm requires high running time, due to the weaknesses of the RSA algorithm which has a working concept of finding the multiplication factor of two large prime numbers [36]. Another factor is the application of two types of keys simultaneously for both the encryption and decryption processes, resulting in the greater complexity of the hybrid algorithm.…”
Section: Analysis Of Experiments Resultsmentioning
E-business security becomes an important issue in the development of technology, to ensure the safety and comfort of transactions in the exchange of information is privacy. This study aims to improve security in e-business systems using a hybrid algorithm that combines two types of keys, namely symmetric and asymmetric keys. Encryption and decryption of messages or information carried by a symmetric key using the simple symmetric key algorithm and asymmetric keys using the Rivest Shamir Adleman (RSA) algorithm. The proposed hybrid algorithm requires a high running time in the decryption process compared to the application of a single algorithm. The level of security is stronger because it implements the process of message encryption techniques with two types of keys simultaneously.
“…Experiments in Table 8, using samples of different numbers of strings, show that the running time required for the decryption process is longer than the encryption process. The application of the hybrid TELKOMNIKA Telecommun Comput El Control Improvement security in e-business systems using hybrid algorithm (L Sumaryanti) 1541 algorithm requires high running time, due to the weaknesses of the RSA algorithm which has a working concept of finding the multiplication factor of two large prime numbers [36]. Another factor is the application of two types of keys simultaneously for both the encryption and decryption processes, resulting in the greater complexity of the hybrid algorithm.…”
Section: Analysis Of Experiments Resultsmentioning
E-business security becomes an important issue in the development of technology, to ensure the safety and comfort of transactions in the exchange of information is privacy. This study aims to improve security in e-business systems using a hybrid algorithm that combines two types of keys, namely symmetric and asymmetric keys. Encryption and decryption of messages or information carried by a symmetric key using the simple symmetric key algorithm and asymmetric keys using the Rivest Shamir Adleman (RSA) algorithm. The proposed hybrid algorithm requires a high running time in the decryption process compared to the application of a single algorithm. The level of security is stronger because it implements the process of message encryption techniques with two types of keys simultaneously.
“…For example, for the chains presented in the previous paragraph, they can be assigned codes 1, 2, 3, 4, 5, and 6, respectively. The LZW technique (Lempel-Ziv-Welch) is a variant of the LZ and is one of the most commonly used in practice, in this case, a pointer is used, instead of symbol code [28].…”
Section: Arithmetic Codingmentioning
confidence: 99%
“…A quantification process is applied to these coefficients, where generally, a significant number of the coefficients have small values that are insignificant, which can be eliminated through a process known as quantization, resulting in the loss of information, even if this does not imply appreciable distortion of the image. In this way, a small number of image data is obtained, to which a lossless coding technique is usually applied to improve the results [28]. The discrete cosine transforms (known as DCT for its acronym in English) is more frequently used for image compression, due to its ability to package information, because it packages most of the information into the smallest number of coefficients; DCT also minimizes the visibility of the boundaries between sub-images [33][34][35][36][37].…”
This paper presents a review of the compression technique in digital image processing. As well as a brief description of the main technologies and traditional format that commonly used in image compression. It can be defined as image compression a set of techniques that are applied to the images to store or transfer them in an effective way. In addition, this paper presents formats that use to reduce redundant information in an image, unnecessary pixels and non-visual redundancy. The conclusion of this paper The results for this paper concludes that image compression is a critical issue in digital image processing because it allows us to store or transmit image data efficiently.
“…The hidden particulars to be embedded can be some words, writer ‗s serial digits, organization logo, photos containing exceptional influence. These secret details are embedded in digital information (images, audio, and video) to uphold the security, data authentication, identification of possessor and copyright defense [9][10][11][12][13]. The image that is required to be embedded is called a watermark image and the image which carries the watermark is called host or original image.…”
<span>This paper presents a watermarking scheme for grayscale images, in which lifting wavelet transform and singular value decomposition are exploited based on multi-objective artificial bee colony optimization to produce a robust watermarking method. Furthermore, for increasing security encryption of the watermark is done prior to the embedding operation. In the proposed scheme, the actual image is altered to four sub-band over three levels of lifting wavelet transform then the singular value of the watermark image is embedded to the singular value of LH sub-band of the transformed original image. In the embedding operation, multiple scaling factors are utilized on behalf of the single scaling element to get the maximum probable robustness without changing watermark lucidity. Multi-objective artificial bee colony optimization is utilized for the determination of the optimal values for multiple scaling components, which are examined against various types of attacks. For making the proposed scheme more secure, the watermark is encrypted chaotically by logistic chaotic encryption before embedding it to the host (original) image. The experimental results show excellent imperceptibility and good resiliency against a wide range of image processing attacks.</span>
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.