Anti-forensics: The image asymmetry key and single layer perceptron for digital data security

1Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Accessing or theft of public network information is very vulnerable to data transmission on public networks, this has an impact on the loss of those who have the information. In the digital forensic world, securing data is a technique for anti-forensic that aims to keep data safe. One way to secure information when sending is done is to encrypt the data and information. Encryption techniques play an important role in cryptography to hide text or messages into an image as a public key. The use of images as key objects is very effective for data security and the information cannot be read or unknown by unauthorized persons. In this case the asymmetric key cryptographic technique uses images and the single layer perceptron, asymmetric cryptography through the encryption and description process can produce data and information security keys that are difficult to guess. The use of keys is done by extracting image features using the GLCM (grey level co-occurrence matrix) to produce random symbols perfectly through the training process using a single layer perceptron encryption asymmetry key and description that can be accounted for integrity.

Cite

CITATION STYLE

APA

Mualfah, D., Fatma, Y., & Ramadhan, R. A. (2020). Anti-forensics: The image asymmetry key and single layer perceptron for digital data security. In Journal of Physics: Conference Series (Vol. 1517). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1517/1/012106

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free