Revista: | Computación y sistemas |
Base de datos: | |
Número de sistema: | 000560608 |
ISSN: | 1405-5546 |
Autores: | Setiadi, De Rosal Ignatius Moses1 Salam, Abu1 Rachmawanto, Eko Hari1 Sari, Christy Atika1 |
Instituciones: | 1Dian Nuswantoro University, Department of Informatics Engineering, Semarang. Indonesia |
Año: | 2021 |
Periodo: | Jul-Sep |
Volumen: | 25 |
Número: | 3 |
Paginación: | 545-556 |
País: | México |
Idioma: | Inglés |
Tipo de documento: | Artículo |
Resumen en inglés | This study proposes the hybrid substitution cryptography method followed by chaotic methods to improve the security of digital image transactions on the internet. The substitution method used is a hybrid of the modification of the Vigenèreand Beaufort cipher algorithm. To do a hybrid, two random keys are used. The first random key is a matrix with 8-bits integer values, while the second random key is a matrix that contains binary values. The modulus operation is used in the main process of substitution methods. In this study, 24-bits true-color image was used as a dataset for the testing experiment. Measurement of encryption quality is measured by Entropy, MSE, PSNR, SSIM, UACI, and NPCR, whereas tic toc functions for measuring the computational time needed. To ensure the decryption process runs perfectly, measuring instruments such as SSIM, MSE, and PSNR are used to compare the decrypted image with the original image, the tic toc function is also used to measure computing performance. Based on the results of testing the quality of image encryption proved to have excellent results where the entropy value is close to 8, the ideal NPCR and UACI values, as well as excellent visual values based on MSE, PSNR and SSIM measurements. The image can also be decrypted perfectly with relatively fast computing time in the encryption and decryption process. |
Disciplinas: | Ciencias de la computación |
Palabras clave: | Procesamiento de datos |
Keyword: | Image encryption, Substitution cipher, Modulus operation, Random key, Hybrid cryptography, Data processing |
Texto completo: | Texto completo (Ver HTML) Texto completo (Ver PDF) |