Application of the DCT Algorithm to Protect Image Files with Key Symbols

Setia Hariati1, M. H. Pardede2, Marto Sihombing3, Stmik Kaputama
{"title":"Application of the DCT Algorithm to Protect Image Files with Key Symbols","authors":"Setia Hariati1, M. H. Pardede2, Marto Sihombing3, Stmik Kaputama","doi":"10.59934/jaiea.v3i3.456","DOIUrl":null,"url":null,"abstract":"Image file protection is an important aspect in managing and transmitting visual data in today's digital era. One effective method for protecting images is to use the Discrete Cosine Transformation (DCT) algorithm based on the principle of randomization with key symbols. This research aims to describe the application of the DCT algorithm in the context of image protection using key symbols as a security method. This research includes the main stages, namely randomization of the original image using predetermined key symbols, transformation of the image to the DCT domain, and storage of the scrambled image. By scrambling the image using key symbols known only to authorized parties, the original image can be changed significantly so that it is difficult to reconstruct by unauthorized parties. In addition, the results of this DCT transformation can also be encrypted using a strong cryptographic algorithm, thereby increasing the security level of image protection. The research results show that this method is effective in protecting image files from unauthorized access and unwanted surveillance. The final result of implementing the DCT algorithm with this key symbol is an image that is protected with a high level of security and can be restored correctly by authorized parties using the appropriate key symbol. This research has broad potential application in a variety of contexts, including data security, confidential image storage, and secure image transmission over communications networks. Thus, this method can make a positive contribution in overcoming information security challenges in an increasingly complex digital era.","PeriodicalId":320979,"journal":{"name":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","volume":"51 7","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.59934/jaiea.v3i3.456","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Image file protection is an important aspect in managing and transmitting visual data in today's digital era. One effective method for protecting images is to use the Discrete Cosine Transformation (DCT) algorithm based on the principle of randomization with key symbols. This research aims to describe the application of the DCT algorithm in the context of image protection using key symbols as a security method. This research includes the main stages, namely randomization of the original image using predetermined key symbols, transformation of the image to the DCT domain, and storage of the scrambled image. By scrambling the image using key symbols known only to authorized parties, the original image can be changed significantly so that it is difficult to reconstruct by unauthorized parties. In addition, the results of this DCT transformation can also be encrypted using a strong cryptographic algorithm, thereby increasing the security level of image protection. The research results show that this method is effective in protecting image files from unauthorized access and unwanted surveillance. The final result of implementing the DCT algorithm with this key symbol is an image that is protected with a high level of security and can be restored correctly by authorized parties using the appropriate key symbol. This research has broad potential application in a variety of contexts, including data security, confidential image storage, and secure image transmission over communications networks. Thus, this method can make a positive contribution in overcoming information security challenges in an increasingly complex digital era.
应用 DCT 算法用关键符号保护图像文件
图像文件保护是当今数字时代管理和传输视觉数据的一个重要方面。保护图像的一种有效方法是使用基于随机化原理的离散余弦变换(DCT)算法和关键符号。本研究旨在描述 DCT 算法在使用关键符号作为安全方法保护图像方面的应用。这项研究包括几个主要阶段,即使用预先确定的关键符号对原始图像进行随机化、将图像转换到 DCT 域以及存储加扰图像。通过使用只有授权方才知道的关键符号对图像进行加扰,可以显著改变原始图像,从而使未经授权方难以重建图像。此外,这种 DCT 变换的结果还可以使用强加密算法进行加密,从而提高图像保护的安全级别。研究结果表明,这种方法能有效保护图像文件,防止未经授权的访问和不必要的监视。使用这种密钥符号实施 DCT 算法的最终结果是,图像受到高度安全的保护,授权方可使用适当的密钥符号正确还原图像。这项研究在数据安全、机密图像存储和通信网络安全图像传输等多个领域都有广泛的应用前景。因此,在日益复杂的数字时代,这种方法可以为克服信息安全挑战做出积极贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信