Sarwono Sutikno

Learn More
In this paper, a chaos-based spread spectrum watermarking algorithm is developed in the DCT domain for still image. The most important feature of chaos is its sensitivity to initial conditions. This characteristic makes chaos has been used successfully for secure watermarking and encryption. In our algorithm, we use logistic map to produce pseudo-random(More)
—Time-to-market pressure and productivity gap force vendors and researchers to improve embedded system design methodology. Current used design method, Register Transfer Level (RTL), is no longer be adequate to comply with embedded system design necessity. It needs a new methodology for facing the lack of RTL. In this paper, a new methodology of hardware(More)
In this paper, we propose a new block cipher called BC2 (Block Cipher 2). We make a cipher using components that are believed secure. The structure of BC2 is very simple. We use Feistel network with input-output 128 bits, matrix Maximum Distance Separable (MDS) 8x8 with branch number 9 to give high diffusion, a function affine equivalent to the inverse(More)
Time-to-market pressure and productivity gap are two factors that encourage the Electronic Design Automation (EDA) industry and researcher of embedded system to enhanche embedded system design method. Current embedded system design approach, Register Transfer Level, is not sufficient to fulfill the embedded system design necessity. It needs a new design(More)
Information is an asset, such as important business assets, has value to an organization and consequently must be well protected. In organizations, information becomes an important and must remain available, and its existence should be maintained from unauthorized access. The use of information by unauthorized parties could be used for negative purposes(More)
— This paper presents an asymmetric watermarking technique derived from Wang Algorithm, a symmetric watermarking technique. This asymmetric version uses secret watermark as private key and public watermark as public key. The public watermark has a normal distribution and the private watermark is a linear combination of the public watermark and a secret(More)
This paper proposes a transformation scheme for rendering the asymmetric watermarking technique into its asymmetric version. The asymmetric technique uses secret watermark as private key and public watermark as public key. The public watermark has a normal distribution and the private watermark is a linear combination of the public watermark and a secret(More)