An Evaluation of Number of Pixels Change Rate (NPCR) in Symetric Cryptography Based on Data Encryption Standard (DES) DOI

Muhammad Rizky Naufal,

Christy Atika Sari, Eko Hari Rachmawanto

et al.

2020 International Seminar on Application for Technology of Information and Communication (iSemantic), Journal Year: 2023, Volume and Issue: unknown, P. 490 - 495

Published: Sept. 16, 2023

Data Encryption Standard (DES) is a symmetric encryption algorithm that uses single key to encrypt and decrypt information. In addition, the cipher text will be hidden inside an image using Stepic. DES use decryption decrypt. It secure maintain speed of decryption. The result this study lowest error we got as Mean Square Error (MSE) 0.00% inversely proportional with Peak Signal Noise Ratio (PSNR) Avalanche 79.36% 34.91% in order not stable for Effect (AVA). Inversely length image, longest hidden, more changes get highest Unified Average Changing Intensity (UACI) Number Pixels Change Rate (NPCR) biggest size 43.47% UACI 99.87% NPCR.

Language: Английский

Evaluation of Unreliable Retrial G-queue Using Fuzzy ARAS Method DOI Open Access

S Suresh,

M Ramachandran, Sathiyaraj Chinnasamy

et al.

Published: Aug. 1, 2022

A Regular busy server crashes due to negative customer traffic, and holiday interruption is being considered. If the orbit empties at end of a positive service, worked Going on vacation. working vacation (WV) low service rate works. there are clients computer each holiday, probability that new visitor inactive p (single WV) or with q (multiple WVs). Substantial variable technique, constant state for system its we found generating function. System performance measures, reliability measures random decay law discussed. Finally, Some numerical examples cost optimization analysis provided. Alternative: Single-Server Review G- Sequence, Incredible G-Series, Volume Visit G-Series. Evaluation Preference: Working vacation, Bernoulli feedback, Random vacations, single Unreliable retrial G-queue, Batch arrival Retrial iteration taken as G-sequence alternative evaluation parameters. In this from Fuzzy ARAS method best solution determines shortest distance longest negative-best solution, but comparison these distances not considered significant. As result it seems unreliable G-queue got first rank where having lowest rank.

Language: Английский

Citations

3

Modern Soft Computing Techniques and Their Various Applications DOI
Kamal Saluja, Sunil Gupta, Jatin Arora

et al.

2022 IEEE 7th International conference for Convergence in Technology (I2CT), Journal Year: 2023, Volume and Issue: unknown, P. 1 - 4

Published: April 7, 2023

In contrast to traditional computing, soft computing can be used adjust prediction models and locate answers difficult, real-world issues. Soft is more forgiving of ambiguity than classical computing. For the gold standard human brain. includes innovations like machine learning, artificial neural networks, genetic algorithms, fuzzy logic, expert systems. First proposed in 1980s, now a central focus academic inquiry across disciplines. widely commercial, industrial, household settings due its low cost high performance. finding uses today. This article compares contrasts benefits with those contemporary

Language: Английский

Citations

1

Private Cloud Hybrid Architecture for Protected Data Communication DOI

Abdul Majid Soomro,

Awad Bin Naeem, Sanjoy Kumar Debnath

et al.

Published: May 5, 2023

The IT sector is fast embracing cloud computing, a nextgeneration technology. Even though this technology offers many benefits, there are also some downsides. most challenging aspect of security. We described three-tier architecture for private cloud-based encrypted communication where developed brand-new custom approach and combined steganography to provide an additional layer protection data transmission across the cloud. suggested technique effectively serves as road map building Cloud security architecture. Additionally, key may be distributed users using efficient management strategies, ensuring that only those who authorized have access data.

Language: Английский

Citations

1

Computational System Based on Machine Learning with Hybrid Security Technique to Classify Crime Offenses DOI
Ankit Bansal, Vijay Anant Athavale, Kamal Saluja

et al.

Lecture notes in electrical engineering, Journal Year: 2023, Volume and Issue: unknown, P. 237 - 248

Published: Jan. 1, 2023

Language: Английский

Citations

1

An Evaluation of Number of Pixels Change Rate (NPCR) in Symetric Cryptography Based on Data Encryption Standard (DES) DOI

Muhammad Rizky Naufal,

Christy Atika Sari, Eko Hari Rachmawanto

et al.

2020 International Seminar on Application for Technology of Information and Communication (iSemantic), Journal Year: 2023, Volume and Issue: unknown, P. 490 - 495

Published: Sept. 16, 2023

Data Encryption Standard (DES) is a symmetric encryption algorithm that uses single key to encrypt and decrypt information. In addition, the cipher text will be hidden inside an image using Stepic. DES use decryption decrypt. It secure maintain speed of decryption. The result this study lowest error we got as Mean Square Error (MSE) 0.00% inversely proportional with Peak Signal Noise Ratio (PSNR) Avalanche 79.36% 34.91% in order not stable for Effect (AVA). Inversely length image, longest hidden, more changes get highest Unified Average Changing Intensity (UACI) Number Pixels Change Rate (NPCR) biggest size 43.47% UACI 99.87% NPCR.

Language: Английский

Citations

1