APLIKASI ENKRIPSI CITRA MENGGUNAKAN ALGORITMA KRIPTOGRAFI ARNOLD CAT MAP Dan LOGISTIC MAP
DOI:
https://doi.org/10.30812/matrik.v16i1.14Keywords:
chaos, image, image encryption, random pixelAbstract
Data security in the process of information exchange is very important. One way to secure the image is to use cryptographic techniques. Cryptographic algorithms applied to the image is used to randomize the position of pixels using a secret key parameters, so that images can not be recognized anymore after the encryption process. In this study, researchers used the algorithm of chaos known as algorithms compact, fast and commonly used in cryptography especially those in the image file. The results showed the image that has been through an encryption process can not be recognized because the randomization process image pixel position is performed using chaos algorithm.
Downloads
References
[2] Kurniawan, Yusuf. 2004. Kriptografi Keamanan Internet dan Jaringan Komunikasi. Bandung : Informatika.
[3] Munir, R. 2006. Kriptografi. Penerbit Informatika. Bandung
[4] Munir, R. 2011. Enkripsi Selektif Citra Digital dengan Stream Cipher Berbasiskan pada Fungsi Chaotik Logistic Map. Prosiding Seminar Nasional dan Expo Teknik Elektro 2011, ISSN : 2088-9984
[5] Stallings, William. (2004). Cryptography and Network Security : Principles and Practice. Prentice-Hall, New Jersey
[6] Stinson, R, D. 2002. Cryptography Theory and Practice 2nd Edition. CRC Press Inc. Boca Raton, London
[7] Huang, Mao-Yu., Huang, Yueh-Min., Wang, Ming-Shi. 2010. Image Encryption Algorithm Based on Chaotic Map. Computer Symposium (ICS) International. IEEE Xplore, 154-158.
[8] Younes, M A B , Jantan A. (2008). “Image Encryption Using Block-Based Transformation Algorithmâ€. IAENG International Journal of Computer Science. 35:1
[9] C. Fu, J. Chen, H. Zou, W. Meng, Y. Zhan, Y. Yu. 2012. A Chaos-based Digital Image Encryption Scheme with an improved Diffusion Strategy. Journal Optic Express 2363, Vol. 20. No.3.
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Gallen cakra adhi wibowo, Sri Yulianto Joko Prasetyo, Irwan Sembiring, Tsunami Vulnerability and Risk Assessment in Banyuwangi District using machine learning and Landsat 8 image data , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- Siti Ummi Masruroh, Andrew Fiade, Muhammad Ikhsan Tanggok, Rizka Amalia Putri, Luigi Ajeng Pratiwi, Convolutional Neural Network for Colorization of Black and White Photos , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- Suhirman Suhirman, Shoffan Saifullah, Ahmad Tri Hidayat, Rr Hajar Puji Sejati, Otsu Method for Chicken Egg Embryo Detection based-on Increase Image Quality , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 2 (2022)
- Ervina Farijki, Bambang Krismono Triwijoyo, SEGMENTASI CITRA MRI MENGGUNAKAN DETEKSI TEPI UNTUK IDENTIFIKASI KANKER PAYUDARA , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 2 (2016)
- Anita Desiani, Irmeilyana Irmeilyana, Endro Setyo Cahyono, Des Alwine Zayanti, Sugandi Yahdin, Muhammad Arhami, Irvan Andrian, Combination Contrast Stretching and Adaptive Thresholding for Retinal Blood Vessel Image , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 1 (2022)
- Ahmad Fatoni Dwi Putra, Muhamad Nizam Azmi, Heri Wijayanto, Satria Utama, I Gede Putu Wirarama Wedashwara Wirawan, Optimizing Rain Prediction Model Using Random Forest and Grid Search Cross-Validation for Agriculture Sector , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 3 (2024)
- Dadang Priyanto, Raisul Azhar, SISTEM APLIKASI UNTUK KEAMANAN DATA DENGAN ALGORITMA 'DES' (Data Encryption Standard) , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 16 No. 1 (2016)
- Budi Sumanto, Salima Nurrahma, Comparison of Random Forest Support Vector Machine and Passive Aggressive Models on E-nose-Based Aromatic Rice Classification , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 3 (2025)
- Danang Wahyu Utomo, Christy Atika Sari, Folasade Olubusola Isinkaye, Quality Improvement for Invisible Watermarking using Singular Value Decomposition and Discrete Cosine Transform , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 3 (2024)
- Erlin Erlin, Yenny Desnelita, Nurliana Nasution, Laili Suryati, Fransiskus Zoromi, Dampak SMOTE terhadap Kinerja Random Forest Classifier berdasarkan Data Tidak seimbang , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Muhammad Ali Akbar Hutasuhut, Pahrul Irfan, Sistem Informasi Pemasaran Paket Tour Koperasi Karya Wisata Senggigi Berbasis Web , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 1 (2018)