2 research outputs found

    Study and Analysis of End-to-End Encryption Message Security Using Diffie-Hellman Key Exchange Encryption

    Get PDF
    The development of the field of communication has progressed rapidly. One example is a message exchange application like Whatsapp. The advancement of technology and innovation in the field of communication has allowed us to connect with people around the world in an easier and faster way. However, with advances in communication technology, new challenges arise related to information security and privacy of messages that have been sent. One solution to overcome this problem is to apply Cryptographic Techniques. In cryptography, data sent over the network will be disguised in such a way with encryption techniques so that even if the data can be read, it cannot be understood by unauthorized parties. The data to be sent without being encoded is known as plaintext, and after being disguised in an encoding way, this plaintext will turn into ciphertext. The method chosen for this journal is the Diffie-Hellman Key Exchange. In this journal, an analysis will be carried out regarding the end-to-end process of securing encrypted messages using the Python programming language

    Audio, Text, Image, and Video Digital Watermarking Techniques for Security of Media Digital

    Get PDF
    The proliferation of multimedia content as digital media assets, encompassing audio, text, images, and video, has led to increased risks of unauthorized usage and copyright infringement. Online piracy serves as a prominent example of such misuse. To address these challenges, watermarking techniques have been developed to protect the copyright of digital media while maintaining the integrity of the underlying content. Key characteristics evaluated in watermarking methods include capability, privacy, toughness, and invisibility, with robustness playing a crucial role. This paper presents a comparative analysis of digital watermarking methods, highlighting the superior security and effective watermark image recovery offered by singular value decomposition. The research community has shown significant interest in watermarking, resulting in the development of various methods in both the spatial and transform domains. Transform domain approaches such as Discrete Cosine Transform, Discrete Wavelet Transform, and Singular Value Decomposition, along with their interconnections, have been explored to enhance the effectiveness of digital watermarking methods
    corecore