Javascript must be enabled to continue!
Implementation Of Image Security On Electronic Wedding Card Using Secure Image Protection Algorithm
View through CrossRef
The marriage book is an official document in the form of a quote from the marriage certificate which is legal evidence of the existence of a marriage. Marriage books are given to couples who are legally married and are administratively registered in the country. The only interested parties who can issue a marriage certificate are the Office of Religious Affairs or KUA. With the sophistication of technology, there has been a modification of the marriage book, namely the marriage card which is designed as big as an ATM card. With the digital marriage card, it can make it easier for the bride and groom to carry a marriage book when going anywhere. The use of a marriage card can cause other adverse effects, one of which is that the security used is not guaranteed and the fear of misuse of the identity data of the spouse of the marriage card owner. Inside this marriage card, there is a barcode that contains partner data such as NIK, wedding date and even self-identity that is vulnerable to misuse. So, security is needed that can protect against theft of data that is secured through barcodes, so image security on electronic marriage cards is arranged using a secure image protection algorithm. Image processing is a process of processing pixels in a digital image for a specific purpose. Image processing and computer vision are used as the human eye, with image capture input devices such as cameras and scanners being used as eyes and computer machines (with their computational programs) being used as brains. that processes information. The Secure Image Protection algorithm is one method that can be used in processing the security image of this marriage card, which consists of system input, namely the image to be encrypted or decrypted and the key is then carried out the encryption or decryption process and then produces an output image that has hidden information. So that in the end we get a system that can secure the data on the marriage card in the form of an image processing pixel permutation system that is able to maintain the privacy of the confidentiality of the image on the electronic marriage card.
CV. Afdifal Maju Berkah
Title: Implementation Of Image Security On Electronic Wedding Card Using Secure Image Protection Algorithm
Description:
The marriage book is an official document in the form of a quote from the marriage certificate which is legal evidence of the existence of a marriage.
Marriage books are given to couples who are legally married and are administratively registered in the country.
The only interested parties who can issue a marriage certificate are the Office of Religious Affairs or KUA.
With the sophistication of technology, there has been a modification of the marriage book, namely the marriage card which is designed as big as an ATM card.
With the digital marriage card, it can make it easier for the bride and groom to carry a marriage book when going anywhere.
The use of a marriage card can cause other adverse effects, one of which is that the security used is not guaranteed and the fear of misuse of the identity data of the spouse of the marriage card owner.
Inside this marriage card, there is a barcode that contains partner data such as NIK, wedding date and even self-identity that is vulnerable to misuse.
So, security is needed that can protect against theft of data that is secured through barcodes, so image security on electronic marriage cards is arranged using a secure image protection algorithm.
Image processing is a process of processing pixels in a digital image for a specific purpose.
Image processing and computer vision are used as the human eye, with image capture input devices such as cameras and scanners being used as eyes and computer machines (with their computational programs) being used as brains.
that processes information.
The Secure Image Protection algorithm is one method that can be used in processing the security image of this marriage card, which consists of system input, namely the image to be encrypted or decrypted and the key is then carried out the encryption or decryption process and then produces an output image that has hidden information.
So that in the end we get a system that can secure the data on the marriage card in the form of an image processing pixel permutation system that is able to maintain the privacy of the confidentiality of the image on the electronic marriage card.
Related Results
E-Press and Oppress
E-Press and Oppress
From elephants to ABBA fans, silicon to hormone, the following discussion uses a new research method to look at printed text, motion pictures and a te...
Analisis Fikih Muamalah Terhadap Sistem Pengupahan Freelance “X” Wedding dan Event Organizer
Analisis Fikih Muamalah Terhadap Sistem Pengupahan Freelance “X” Wedding dan Event Organizer
Abstract. Service work in muamalah fiqh is included in the Ijarah Al-amal contract, in which the provisions must determine how much nominal wages will be given to workers. However,...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...
PONTIANAK WEDDING CENTER
PONTIANAK WEDDING CENTER
Marriage is a precious moment for every couple, where they formalize their bond legally according to law, norms, and religion. At a wedding, the venue for the event is one that mus...
Do Vehicles Need Data Security?
Do Vehicles Need Data Security?
<div class="section abstract"><div class="htmlview paragraph">Data security was introduced to vehicles in the 1980's with the electronic theft protection system. Since ...
The Importance of Garment Specification on Formal Dress: The Application of a Perfect Wedding Dress
The Importance of Garment Specification on Formal Dress: The Application of a Perfect Wedding Dress
Garment specification plays a critical role in the processing of manufacturing formal dress today, particularly wedding dress. However, wedding dress is usually white for the sake ...
Weddings and Thai Women: The Construction of Weddings and the Portrayal of Thai Women Through Wedding Stories in Thai Wedding Magazines
Weddings and Thai Women: The Construction of Weddings and the Portrayal of Thai Women Through Wedding Stories in Thai Wedding Magazines
Thai wedding magazines have been a primary resource for Thai women seeking wedding planning information. This study analyses the construction of weddings and investigates the portr...
Sag effects on protection system in distributed generation grids
Sag effects on protection system in distributed generation grids
Distributed Generators (DGs) are sensible to voltage sags, so the protection devices must trip fast to disconnect the faulted part of the grid. The DG disconnection will not be des...

