BIS 2019 Conference

Digital Data Security Using The Image Asymmetry Key And Single Layer Perceptron
Desti Mualfah (a)*, Yulia Fatma (b), Rizdqi Akbar Ramadhan (c)

a,b Fakultas Ilmu Komputer Universitas Muhammadiyah Riau
destimualfah[at]umri.ac.id
c Fakultas Teknik Informatika Universitas Islam Riau


Abstract

Accessing or theft of public network information is very vulnerable to deploy data on public networks, this has a major impact on those who have the information. One of many to obtain information on the compilation process is to encrypt data and reform it. Encryption techniques play an important role in cryptography to hide text or messages into public images. The use of images as key objects is very effective for data security and the information cannot be read or is unknown to people who cannot be transferred. In this case the asymmetric key cryptographic technique uses images and single layer perceptron, asymmetric cryptography through the process of encryption and description can produce data and information security keys that are difficult to guess. The use of keys is done by extracting image characteristics using the GLCM (gray level co-occurence matrix) to produce symbols created through the training process using a single layer perceptron encryption asymmetry key and description that can be response for in its integration.

Keywords: Digital Data Security; Cryptography; Image; Asymmetry; Perceptron

Topic: Information Engineering

Link: https://ifory.id/abstract-plain/KAYV3eyxQCbv

Web Format | Corresponding Author (Siti Samsiah)