mailto:uumlib@uum.edu.my 24x7 Service; AnyTime; AnyWhere

A review on structured scheme representation on data security application

Mohd Salleh, Siti Norussaadah and Din, Roshidi and Zakaria, Nur Haryani and Mustapha, Aida (2018) A review on structured scheme representation on data security application. Indonesian Journal of Electrical Engineering and Computer Science, 11 (2). pp. 733-739. ISSN 2502-4752

[thumbnail of IJEECS 11 2 2018  733~739.pdf]
Preview
PDF
Available under License Attribution 4.0 International (CC BY 4.0).

Download (142kB) | Preview

Abstract

With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application.

Item Type: Article
Uncontrolled Keywords: teganography scheme; Cryptography scheme; Structured scheme
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: School of Computing
Depositing User: Mrs. Norazmilah Yaakub
Date Deposited: 04 Jul 2018 01:59
Last Modified: 04 Jul 2018 01:59
URI: https://repo.uum.edu.my/id/eprint/24359

Actions (login required)

View Item View Item