2018
DOI: 10.1088/1757-899x/300/1/012040
|View full text |Cite
|
Sign up to set email alerts
|

An Implementation Of Elias Delta Code And ElGamal Algorithm In Image Compression And Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 4 publications
0
3
0
2
Order By: Relevance
“…Shahzadi et al [17] employed an enhanced RC5 encryption algorithm in a remote health monitoring system for the security and integrity of clinical images. Rachmawati et al [18] employed the ElGamal algorithm for image compression and security. Imran et al [19] proposed the ElGamal algorithm for the encryption-decryption of speech signals.…”
Section: Related Workmentioning
confidence: 99%
“…Shahzadi et al [17] employed an enhanced RC5 encryption algorithm in a remote health monitoring system for the security and integrity of clinical images. Rachmawati et al [18] employed the ElGamal algorithm for image compression and security. Imran et al [19] proposed the ElGamal algorithm for the encryption-decryption of speech signals.…”
Section: Related Workmentioning
confidence: 99%
“…Bilangan Integer positif yang merupakan elemen dari matriks berkorespondensi dengan region yang bersesuaian. Sebelumnya pada tahun 2015, hasil penelitian yang dilakukan oleh Puji Triono dan Murinto telah berhasil mendeteksi fraktur tulang dengan menggunakan metode tepi canny dengan hasil pengujian sistem menunjukan nilai akurasi deeksi pada citra tulang paha dengan posisi Antero Posterio adalah 80% dan citra tulang paha dengan posisi Lateral adalah 85,71% [3].…”
Section: Pendahuluanunclassified
“…Kunci simetris menggunakan kunci acak 128-bit. Algoritma asimetris yang digunakan adalah algoritma Elgamal yang digunakan untuk mengenkripsi kunci simetris menjadi cipher key agar bersifat publik (tidak rahasia), dan mendekripsi kembali menjadi kunci simetris (Rachmawati et al, 2018).…”
Section: Metode Penelitianunclassified