scholarly journals PENGAMANAN IMAGE DENGAN MODIFIKASI ALGORITMA ELECTRONIC CODE BOOK (ECB)

2018 ◽  
Vol 18 (2) ◽  
pp. 91
Author(s):  
Melinda Asti ◽  
Ahmad Kamsyakawuni ◽  
Kiswara Agung Santoso

Cryptography is knowledge of encoding data to ensure the confidentiality, security, validity and integrity of data. Cryptography is divided into two namely classical cryptography and modern cryptography. One example of modern cryptography is the Electronic Code Book (ECB). Electronic Code Book (ECB) is a modern cryptographic method used to encrypt and decrypt text, images and more. The image is formed from several pixels which consist of several bits in a pixel. Bits are divided into two namely Least Significant Bit (LSB) and Most Significant Bit (MSB).LSB is the four rightmost bits while MSB is the leftmost four bits of a pixel. The purpose of this study is to compare the level of security of Electronic Code Book (ECB) image security results with the results of securing an Electronic Code Book (ECB) modified image. The data used in this study are 8 RGB and Greyscale images also a key in the form of one ASCII character. The results obtained show that securing images with modified Electronic Code Book (ECB) is safer than securing images with Electronic Code Book (ECB) based on histogram analysis, differential analysis and correlation coefficients. Keywords: ASCII, Electronic Code Book (ECB), Most Significant Bit (MSB)

2018 ◽  
Vol 10 (2) ◽  
pp. 49
Author(s):  
Abduh Riski ◽  
Heri Purwantoro ◽  
Ahmad Kamsyakawuni

Government Standard (GOST) is a 64-bit block cipher algorithm with 32 round, use a 256-bit key. The weakness of this algorithm is the keys so simple, than make cryptanalyst easy to break this algorithm. Least Significant Bit (LSB)  use to insert message into another form without changing the form of the cover after insertion. This research does by hiding encrypted ciphertext to image and hiding image into audio. This research use grayscale and RBG image with BMP and PNG format. Audio using music with wav format. Security analysis using differential analysis NPCR and UACI. Security analysis aims to calculate percentage from cover after hiding the message. The smaller the NPCR and UACI values, the higher the level of security the message is hidden. The results of the analysis of concealment in the image obtained by the average values of NPCR and UACI were 99.98% and 3.46% respectively. While the results of the analysis of hiding in audio obtained the average value of NPCR and UACI were 83.78% and 12.66% respectively.


2019 ◽  
Vol 3 (2) ◽  
pp. 393
Author(s):  
Adi Widarma ◽  
Helmi Fauzi Siregar ◽  
M Dedi Irawan

Data is important information both personal, group and company. Because of the importance of the data, many parties have kept the data very confidential so that it is not publicly recognized. But it cannot be denied that data can be stolen by unauthorized people. Request the data to be unsafe. A technique is needed to move data, namely by using cryptography. One of the existing cryptography techniques is classical cryptography such as vigenere cipher. However, this classic has a low level of security so it needs to be upgraded again. Then a combination of cryptography algorithms using modern cryptography, Electronic Code Book (ECB) is carried out. Using a combination of these two algorithms will improve data security.


Author(s):  
Ghada Zaibi ◽  
Fabrice Peyrard ◽  
Abdennaceur Kachouri ◽  
Danièle Fournier-Prunaret ◽  
Mounir Samet

A new and secure chaos-based block cipher for image encryption in wireless sensor networks is proposed. The security analysis and the performances of the proposed algorithm have been investigated. The statistical analysis includes the histograms and correlation coefficients of adjacent pixels. In the differential analysis, the authors use the Number of Pixels Change Rate (NPCR) and the Unified Changing Average (UACI) measures to demonstrate the security against differential attacks. Key sensitivity analysis and key space analysis show that the proposed cipher is secure and resistant to brute force attack. The authors demonstrate that the performance of the cipher exceeds the studied encryption algorithms as well as AES (Advanced Encryption Standard). An implementation on a real wireless sensor network testbed is realized, and the energy consumption is investigated.


2020 ◽  
Vol 11 (1) ◽  
pp. 20-29
Author(s):  
Nur Fitrianingsih Hasan ◽  
Christin Nandari Dengen ◽  
Dony Ariyus

Kesadaran pentingnya keamanan data pada era digital saat ini ditandai dengan berkembangnya aplikasi keamanan data. Pada penelitian ini akan dilakukan analisis histogram terhadap suatu aplikasi keamanan data. Tujuan dari analisa ini adalah mengetahui perubahan histogram yang dilakukan penyisipan pesan. Hasilnya penyisipan pesan pada citra menggunakan Least Significant Bit secara visual tidak terlihat perubahan. Analisis histogram menunjukkan perubahan grafik terlihat lebih signifikan pada file gambar .tif, .png dan .jpg sementara .bmp tidak signifikan. Jumlah karakter yang disisipkan mempengaruhi grafik histogram. Stego image yang dihasilkan memenuhi syarat imperceptibility. Dibuktikan dari nilai PSNR yang dihasilkan yaitu PSNR >40db. Perubahan ekstensi image menjadi salah satu faktor hasil nilai PSNR. Dibuktikan dengan ekstensi image .bmp memiliki nilai MSE paling rendah dan PSNR paling tinggi yaitu, MSE=0,66141 dan PSNR=49,9601.   Kata kunci: Histogram, Steganografi, LSB, Grayscale, PSNR   Abstract Awareness of the importance of data security in the current digital era is marked by the development of data security applications. In this study a histogram analysis of a data security application will be performed. The purpose of this analysis is to determine the histogram changes made by message insertion. The result is the insertion of messages in the image using Least Significant Bit visually does not change. Histogram analysis shows that graph changes are more significant in .tif, .png and .jpg image files while .bmp is not significant. The number of characters inserted affects the histogram graph. The resulting stego image meets the requirements of imperceptibility. Proven from the PSNR value generated is PSNR>40dB. The change in image extension is one of the factors resulting from the PSNR value. Evidenced by the extension .bmp image has the lowest MSE value and the highest PSNR, namely, MSE=0.66141 andPSNR=49.9601. Keywords: Histogram, Steganography, LSB, Grayscale, PSNR.


Entropy ◽  
2018 ◽  
Vol 20 (9) ◽  
pp. 716 ◽  
Author(s):  
Shuqin Zhu ◽  
Congxu Zhu ◽  
Wenhong Wang

In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture of confusion and diffusion is adopted. Firstly, the surrounding of a plaintext image is surrounded by a sequence generated from the SHA-256 hash value of the plaintext to ensure that each encrypted result is different. Secondly, the image is scrambled according to the random sequence obtained by adding the disturbance term associated with the plaintext to the chaotic sequence. Third, the cyphertext (plaintext) feedback mechanism of the dynamic index in the diffusion stage is adopted, that is, the location index of the cyphertext (plaintext) used for feedback is dynamic. The above measures can ensure that the algorithm can resist chosen plaintext attacks and can overcome the difficulty of key management in “one time pad” encryption scheme. Also, experimental results such as key space analysis, key sensitivity analysis, differential analysis, histograms, information entropy, and correlation coefficients show that the image encryption algorithm is safe and reliable, and has high application potential.


2021 ◽  
Vol 7 ◽  
pp. e812
Author(s):  
Huwaida T. Elshoush ◽  
Banan M. Al-Tayeb ◽  
Khalil T. Obeid

This paper presents a new approach to enhance the security and performance of the Serpent algorithm. The main concepts of this approach is to generate a sub key for each block using Lorenz 96 chaos and then run the process of encryption and decryption in ECB parallel mode. The proposed method has been implemented in Java, openjdk version “11.0.11”; and for the analysis of the tested RGB images, Python 3.6 was used. Comprehensive experiments on widely used metrics demonstrate the effectiveness of the proposed method against differential attacks, brute force attacks and statistical attacks, while achieving superb results compared to related schemes. Moreover, the encryption quality, Shannon entropy, correlation coefficients, histogram analysis and differential analysis all accomplished affirmative results. Furthermore, the reduction in encryption/decryption time was over 61%. Moreover, the proposed method cipher was tested using the Statistical Test Suite (STS) recommended by the NIST and passed them all ensuring the randomness of the cipher output. Thus, the approach demonstrated the potential of the improved Serpent-ECB algorithm with Lorenz 96 chaos-based block key generation (BKG) and gave favorable results. Specifically, compared to existing encryption schemes, it proclaimed its effectiveness.


Author(s):  
Ankit Chaudhary ◽  
Sandeep Kumar

Steganography is the technique which has been used in many fields for hiding information and many different versions for each application are available in the literature. This chapter demonstrates how to increase the security level and to improve the storage capacity of hidden data, with compression techniques. The security level is increased by randomly distributing the text message over the entire image instead of clustering within specific image portions. The degradation of the images can be minimized by changing only one least significant bit per color channel for hiding the message. Using steganography alone with simple LSB has a potential problem that the secret message is easily detectable from the histogram analysis method. To improve the security as well as the image embedding capacity indirectly, a compression based scheme is introduced. Various tests have been done to check the storage capacity and message distribution.


Sign in / Sign up

Export Citation Format

Share Document