Loading…
Anti-forensics: the image asymmetry key and single layer perceptron for digital data security
Accessing or theft of public network information is very vulnerable to data transmission on public networks, this has an impact on the loss of those who have the information. In the digital forensic world, securing data is a technique for anti-forensic that aims to keep data safe. One way to secure...
Saved in:
Published in: | Journal of physics. Conference series 2020-04, Vol.1517 (1), p.12106 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Citations: | Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Accessing or theft of public network information is very vulnerable to data transmission on public networks, this has an impact on the loss of those who have the information. In the digital forensic world, securing data is a technique for anti-forensic that aims to keep data safe. One way to secure information when sending is done is to encrypt the data and information. Encryption techniques play an important role in cryptography to hide text or messages into an image as a public key. The use of images as key objects is very effective for data security and the information cannot be read or unknown by unauthorized persons. In this case the asymmetric key cryptographic technique uses images and the single layer perceptron, asymmetric cryptography through the encryption and description process can produce data and information security keys that are difficult to guess. The use of keys is done by extracting image features using the GLCM (grey level co-occurrence matrix) to produce random symbols perfectly through the training process using a single layer perceptron encryption asymmetry key and description that can be accounted for integrity. |
---|---|
ISSN: | 1742-6588 1742-6596 |
DOI: | 10.1088/1742-6596/1517/1/012106 |