Home
  • English
  • ÄŒeÅ¡tina
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • LatvieÅ¡u
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Log In
    New user? Click here to register. Have you forgotten your password?
Home
  • Browse Our Collections
  • Publications
  • Researchers
  • Research Data
  • Institutions
  • Statistics
    • English
    • ÄŒeÅ¡tina
    • Deutsch
    • Español
    • Français
    • Gàidhlig
    • LatvieÅ¡u
    • Magyar
    • Nederlands
    • Português
    • Português do Brasil
    • Suomi
    • Log In
      New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Resources
  3. UniMAP Index Publications
  4. Publications 2023
  5. Implementation of image file security using the advanced encryption standard method
 
Options

Implementation of image file security using the advanced encryption standard method

Journal
Indonesian Journal of Electrical Engineering and Computer Science
ISSN
25024752
Date Issued
2023-07-01
Author(s)
Ikhwan A.
Rafikha Aliana A Raof
Universiti Malaysia Perlis
Phak Len Al Eh Kan
Universiti Malaysia Perlis
Yasmin Mohd Yacob
Universiti Malaysia Perlis
Aslami N.
DOI
10.11591/ijeecs.v31.i1.pp562-569
Handle (URI)
https://hdl.handle.net/20.500.14170/4612
Abstract
The application of technology in this era has entered digitalization and is modern. Therefore, we are already in an era of advanced and rapid technological development. It has become a human need to exchange information in every activity. Documents that contain information that is frequently sought or used. The document's use also includes essential information. Document security is undoubtedly a significant factor in prioritizing important information in a document to prevent unauthorized people from misusing the document's vital information. Cryptography is a method of overcoming document security issues so that third parties cannot read the information or messages contained within the document. The 128-bit advanced encryption standard (AES) algorithm is one of the algorithms included in the cryptography technique. Additionally, it can be combined with operation modes such as electronic codebook (ECB) and cipher block chaining (CBC) to create an application that can generate random codes to improve the security of the data contained in the document.
Funding(s)
Universiti Malaysia Perlis
Subjects
  • AES 128 | Cipher bloc...

File(s)
research repository notification.pdf (4.4 MB)
Views
1
Acquisition Date
Nov 19, 2024
View Details
google-scholar
Downloads
  • About Us
  • Contact Us
  • Policies