Loading…

Anti-forensics: the image asymmetry key and single layer perceptron for digital data security

Accessing or theft of public network information is very vulnerable to data transmission on public networks, this has an impact on the loss of those who have the information. In the digital forensic world, securing data is a technique for anti-forensic that aims to keep data safe. One way to secure...

Full description

Saved in:
Bibliographic Details
Published in:Journal of physics. Conference series 2020-04, Vol.1517 (1), p.12106
Main Authors: Mualfah, D, Fatma, Y, Ramadhan, R A
Format: Article
Language:English
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Accessing or theft of public network information is very vulnerable to data transmission on public networks, this has an impact on the loss of those who have the information. In the digital forensic world, securing data is a technique for anti-forensic that aims to keep data safe. One way to secure information when sending is done is to encrypt the data and information. Encryption techniques play an important role in cryptography to hide text or messages into an image as a public key. The use of images as key objects is very effective for data security and the information cannot be read or unknown by unauthorized persons. In this case the asymmetric key cryptographic technique uses images and the single layer perceptron, asymmetric cryptography through the encryption and description process can produce data and information security keys that are difficult to guess. The use of keys is done by extracting image features using the GLCM (grey level co-occurrence matrix) to produce random symbols perfectly through the training process using a single layer perceptron encryption asymmetry key and description that can be accounted for integrity.
ISSN:1742-6588
1742-6596
DOI:10.1088/1742-6596/1517/1/012106