APLIKASI ENKRIPSI CITRA MENGGUNAKAN ALGORITMA KRIPTOGRAFI ARNOLD CAT MAP Dan LOGISTIC MAP
DOI:
https://doi.org/10.30812/matrik.v16i1.14Keywords:
chaos, image, image encryption, random pixelAbstract
Data security in the process of information exchange is very important. One way to secure the image is to use cryptographic techniques. Cryptographic algorithms applied to the image is used to randomize the position of pixels using a secret key parameters, so that images can not be recognized anymore after the encryption process. In this study, researchers used the algorithm of chaos known as algorithms compact, fast and commonly used in cryptography especially those in the image file. The results showed the image that has been through an encryption process can not be recognized because the randomization process image pixel position is performed using chaos algorithm.
Downloads
References
[2] Kurniawan, Yusuf. 2004. Kriptografi Keamanan Internet dan Jaringan Komunikasi. Bandung : Informatika.
[3] Munir, R. 2006. Kriptografi. Penerbit Informatika. Bandung
[4] Munir, R. 2011. Enkripsi Selektif Citra Digital dengan Stream Cipher Berbasiskan pada Fungsi Chaotik Logistic Map. Prosiding Seminar Nasional dan Expo Teknik Elektro 2011, ISSN : 2088-9984
[5] Stallings, William. (2004). Cryptography and Network Security : Principles and Practice. Prentice-Hall, New Jersey
[6] Stinson, R, D. 2002. Cryptography Theory and Practice 2nd Edition. CRC Press Inc. Boca Raton, London
[7] Huang, Mao-Yu., Huang, Yueh-Min., Wang, Ming-Shi. 2010. Image Encryption Algorithm Based on Chaotic Map. Computer Symposium (ICS) International. IEEE Xplore, 154-158.
[8] Younes, M A B , Jantan A. (2008). “Image Encryption Using Block-Based Transformation Algorithmâ€. IAENG International Journal of Computer Science. 35:1
[9] C. Fu, J. Chen, H. Zou, W. Meng, Y. Zhan, Y. Yu. 2012. A Chaos-based Digital Image Encryption Scheme with an improved Diffusion Strategy. Journal Optic Express 2363, Vol. 20. No.3.
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Muhammad Furqan Nazuli, Muhammad Fachrurrozi, Muhammad Qurhanul Rizqie, Abdiansah Abdiansah, Muhammad Ikhsan, A Image Classification of Poisonous Plants Using the MobileNetV2 Convolutional Neural Network Model Method , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 2 (2025)
- Zilvanhisna Emka Fitri, Lalitya Nindita Sahenda, Sulton Mubarok, Abdul Madjid, Arizal Mujibtamala Nanda Imron, Implementing K-Nearest Neighbor to Classify Wild Plant Leaf as a Medicinal Plants , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 1 (2023)
- F.ti Ayyu Sayyidul Laily, Didik Dwi Prasetya, Anik Nur Handayani, Tsukasa Hirashima, Revealing Interaction Patterns in Concept Map Construction Using Deep Learning and Machine Learning Models , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 2 (2025)
- Cherfly Kaope, Yoga Pristyanto, The Effect of Class Imbalance Handling on Datasets Toward Classification Algorithm Performance , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- Magdalena Ariance Ineke Pakereng, Alz Danny Wowor, Yos Richard Beeh, Felix David, Erwien Christianto, Vincent Exelcio Susanto, Claudio Canavaro, Square Transposition Method with Adaptive Key Flexibility and Strong Diffusion Performance , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 3 (2025)
- Miftahuddin Fahmi, Anton Yudhana, Sunardi Sunardi, Image Processing Using Morphology on Support Vector Machine Classification Model for Waste Image , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Putu Tisna Putra, Anthony Anggrawan, Hairani Hairani, Comparison of Machine Learning Methods for Classifying User Satisfaction Opinions of the PeduliLindungi Application , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Munirul Ula, Veri Ilhadi, Zailani Mohamed Sidek, Comparing Long Short-Term Memory and Random Forest Accuracy for Bitcoin Price Forecasting , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Imanuddin Imanuddin, Fachrid Alhadi, Raza Oktafian, Ahmad Ihsan, Deteksi Mata Mengantuk pada Pengemudi Mobil Menggunakan Metode Viola Jones , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 2 (2019)
- Lilik Widyawati, Imam Riadi, Yudi Prayudi, Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 1 (2020)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Muhammad Ali Akbar Hutasuhut, Pahrul Irfan, Sistem Informasi Pemasaran Paket Tour Koperasi Karya Wisata Senggigi Berbasis Web , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 1 (2018)
.png)











