scholarly journals Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security

2018 ◽  
Vol 5 (2) ◽  
pp. 105-117
Author(s):  
Christy Atika Sari ◽  
Eko Hari Rachmawanto ◽  
Christanto Antonius Haryanto

Advances in technology in the field of internet, making the Internet become the most popular data transmission media for now. This is certainly not free from the incidence of cyber crime, such as theft and data modification. Given the losses caused by data manipulation is very detrimental to the owner, then the original data can be misused in the cyber world. Cryptography offers an algorithm for randomizing data, so it can not be read by unauthorized people. The cryptography technique was implemented using Triple Data Encyption Standard (3DES) given the results of a randomized cryptographic algorithm, it is possible to arouse suspicion from the viewer. For that will be done the process of insertion of cryptographic files into another media in the form of images commonly referred to as steganography. The steganography technique that will be used is End of File (EOF). The combination of 3DES and EOF in the 64x64 pixel image with grayscale color format produces the fastest image processing time of 173.00192 seconds with the highest Peak Signal to Noise Ratio (PSNR) value of 25.0004 dB, while in the 128x128 pixel image with grayscale format has produced the highest PSNR 21.0084 dB.

2018 ◽  
Vol 7 (3.2) ◽  
pp. 783
Author(s):  
Ida Bagus Ary Indra Iswara ◽  
I Ketut Sudarsana ◽  
Nurlaidy Joice Simamora ◽  
Vivi Novalia Sitinjak ◽  
Nurhayati Purba ◽  
...  

The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly  


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan ◽  
Robbi Rahim

The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.


2013 ◽  
Vol 6 (2) ◽  
pp. 311-316 ◽  
Author(s):  
Mittapalli Indrasena Reddy ◽  
V. Uday Kumar ◽  
K. Subba Reddy ◽  
P. Venkat Vijay Kumar

Steganography and cryptographic methods are used together with wavelets to increase the security of the data while transmitting through networks. Another technology, the digital watermarking is the process of embedding information into a digital (image) signal. Before embedding the plain text into the image, the plain text is encrypted by using Data Encryption Standard (DES) algorithm. The encrypted text is embedded into the LL subband of the wavelet decomposed image using Least Significant Bit (LSB) method. Then the inverse wavelet transform is applied and the resultant image is transmitted to the receiver. The receiver will perform the same operations in reverse order.


Author(s):  
Dhirendra Bagri ◽  
Shashikant Rathore

Objective: Smart grid is an entity which dwells on a network of Energy Transmission with Integrated data transmission it works for flow of energy and Transmission of data that is generated by the stakeholders and in return it provides them the required electricity without any hurdles or disturbance. The versatility and integrity of entire network completely rely on the truthful data which gets floated from variety of distributed users in the network. There is a huge chance to get attacked through hijacking of smart communication network. Another concern remains raised about unable to use the existing security algorithm due to the enormous amount of data that gets generated in the distributed environment. So, these issues facilitate to work on designing the security algorithm for providing better security and better efficiency in smart meter communication. Methods: This paper is presented with proposed model with enhanced security that not just only encrypt the enormous amount of data but also it does the work of encryption in very less time. The proposed algorithm is based on bi-key computational algorithm where two different entities are used as keys, with the use of this algorithm the task of finding the original data gets transformed into NP hard problem. Results: The Proposed algorithm is analyzed with existing cryptographic algorithm and found more secure and provide better performance. Conclusion: This paper presents simulated results obtained in MATLAB which Justify the adaptability and acceptability of proposed algorithms for enormous generated data.


CCIT Journal ◽  
2017 ◽  
Vol 10 (1) ◽  
pp. 62-74
Author(s):  
Gunawan Putrodjojo ◽  
Julhan H. Purba ◽  
Junawano Candra

Cryptography is a field of knowledge which uses a mathematical equation to perform the encryption and decryption process. This technique is used to convert the data into a specific code, with the aim that the stored information can not be read by anyone except those who are eligible. In this final project will be presented the design of cryptographic applications with cryptographic algorithm Data Encryption Standard. This cryptographic applications implementing encryption and decryption method using the DES algorithm.This research will presenting application design of crioptographic and its algorithm data of DES. This application will implementing the way of encryption and decription using DES.  DES algorithm is adopted as standard algorithm. Since that, DES has been used in desimination  information widely to protect data savely. In every day live, DES is using in many applications like to encrypt PIN (Personal Identity Number) in ATM and Banking transactions via internet. Even government organitations in US like Departmen of Energy, Justice Department, and Federal Reserve System are using DES to protect their data desiminations. The principt of DES  working is devides information in special blocks, so that DES is  known as cipherblock. The messages will be randomly using standard matrix in DES alhgorithm. The first proces will generate DES  key algorithm. Cipherblock with 64 bits block size. Because in this application we have designed  internal key altogether in enription process. The next we will to do enription process. The steps in doine encryption will begin with choosing file .txt. This file contents will be changed as binery numbers using ASCII as reference. The changing file as binary will be devided into 64 bits. Its means automatically that  in DES algorithm using 8-characters or 64-bits. Next step, the deviding text will be permutated using first permutation matrix, the goal is to randomice plaintext. The randomice text will devivided into 2 blocks which 32-bits in length. Each block will use L0 dan R0  as symbol.  The next process will do 16-cycling process. After 16-cycling process, both blocks will  put in  unity. After that, we will final permutation with using permutation matrix iP-1


Author(s):  
Asif Raza ◽  
Muhammad Tanveer Meeran ◽  
Muizzud din

Today data transmission is very important through different channels. Need of network security comes to secure data transformation from one network to another network. As the complexity of the systems and the networks increases, weakness expands and the task of securing the networks is becomes more convoluted. Duty of securing is done by Cryptography techniques. A colossal amount of data is exchanged over public networks like the internet due to immense accommodation. This includes personal details and confidential information. It is important to prevent the data from falling into the wrong hands. So, due to this factor we use cryptography. Encryption and decryption are the basic terms that are used in cryptography. There are few algorithms which used including, AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard) and BLOWFISH. The main contribution of this paper is to provide an algorithm that is useful for data transformation in cognitive radio networks. In this research, we have drawn a new symmetric key technique that is for the usage of cryptography which is helpful to make the data saved from others.


2018 ◽  
Vol 10 (2) ◽  
pp. 63
Author(s):  
Ahmad Kamsyakawuni ◽  
Ahmad Husnan Fanani ◽  
Abduh Riski

Simplified Data Encryption Standard (S-DES) is a cryptographic algorithm whose data-disguise process is simple and fast enough compared to other algorithms. Because of its simplicity, the S-DES algorithm is vulnerable to statistical attacks when applied to imagery, so this study tries to minimize S-DES weaknesses in image data by modifying S-DES keys with Diffie-Hellman. Diffie-Hellman is one of the key generating algorithms and key exchange. This research uses image data that is RGB image and grayscale image. A modified S-DES key with Diffie-Hellman is then used to encrypt the image. This study also analyzed the security level of S-DES algorithm that the key has been modified with Diffie-Hellman.


2018 ◽  
Vol 14 (2) ◽  
Author(s):  
Ibnu Utomo Wahyu Mulyono ◽  
Wellia Shinta Sari ◽  
De Rosal Ignatius Moses Setiadi ◽  
Christy Atika Sari

Proteksi data menggunakan teknik kriptiografi telah dilakukan sejak abad ke 14. Algoritma kriptografi sampai saat ini masih dapat digunakan dan mempunyai tingkat keamanan yang baik salah satunya yaitu Data Encryption Standard (DES). DES melakukan enkripsi dengan kunci simteris dengan panjang 64 bit kunci yang didapat dari kunci eksternal. Beberapa penelitian sebelumnya telah menggunakan DES pada media teks, dalam makalah ini DES akan digunakan pada media gambar. Gambar yang digunakan berukuran 512x512 piksel, dengan pesan berupa file .txt dengan panjang bervariasi antara 8 byte sampai dengan 1024 byte. Penggunaan file pesan yang bervariasi digunakan untuk mengetahui performa DES, baik dari segi waktu enkripsi dan dekripsi maupun hasil proses dekripsi. Hasil eksperimen menggunakan sejumlah pesan menghasilkan nilai Peak Signal to Noise Ratio (PSNR) tertinggi 86.7532 dB, dan waktu enkripsi pesan dengan ukuran kurang dari 64 bit tidak lebih dari 1 detik, sedangkan waktu dekripsi lebih cepat disbanding waktu enkripsi.


Sign in / Sign up

Export Citation Format

Share Document