scholarly journals PENGAMANAN CITRA DIGITAL BERDASARKAN MODIFIKASI ALGORITMA RC4

2018 ◽  
Author(s):  
Taronisokhi Zebua

Digital images of a private and confidential very extend to wiretapping by other parties, especially when the image is distributed over the internet. The tapping or misuse of the confidential private image, of course, harm the image owner. One technique to minimize the above measures is the utilization of cryptographic techniques. Cryptography techniques can secure digital images by modifying the image pixel values so that the resulting image is different from the original image. An RC4 algorithm can be used in realizing the purpose of cryptographic technique. But this algorithm has a weakness where the solving of this algorithm with know plaintext attack or know ciphertext only can be done easily. This research describes the security of digital images based on RC4 algorithm modification. The modification is to add an initial vector block in the process of encryption and decryption and shift a number of bits in a certain position. The result of this research is a digital image with pixel values that are much different from the original pixel value to make it difficult for others in manipulating the secret image

Author(s):  
Mahadi Winafil ◽  
Sinar Sinurat ◽  
Taronisokhi Zebua

Digital images that are personal and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if distributed via the internet network such as on Facebook, WhatsApp and e-mail chat based applications. Images that are sent sometimes are often confidential images and must be maintained. In order to maintain the security of digital images can be done by utilizing cryptographic techniques. Cryptographic techniques can secure digital images by changing pixel values from digital images so as to produce different pixel values from the original image to be secured. This research will use AES 128 bit and Triple DES methods for encryption and decryption of digital images on client-server based applications. The results of the encryption AES algorithm will be re-encrypted with the Triple DES Algorithm so as to produce pixel values that are far different from the original pixel values. Keywords: cryptography, image, AES, Triple DES


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


2020 ◽  
Vol 1 (3) ◽  
pp. 284
Author(s):  
Josua Alfiandi Sinuhaji

Digital imagery is currently very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of digital images can be done by using cryptographic techniques. Cryptographic techniques can encode digital images by encrypting them in the form of passwords that are not understood. ICE is a block cipher published by Kwan in 1997. This algorithm has a structure similar to DES, but with additional bit permutations that do not depend on the key in the rotation function. There are various types of ICE variants, namely Thin-ICE, ICE standard, and ICE-n. The difference between the three is the length of the keyword used and the number of rounds. The Thin-ICE algorithm uses 64 bits and 8 turns. The ICE standard uses 64 bits and 16 round keys. The ICE-n algorithm uses keys 64n bits and 16n turns. The use of this type of algorithm can be adjusted to the needs of users where Thin-ICE has the lowest level of security among the three, while ICE-n is the highest. This algorithm does not become the subject of a patent and the source code can be used freely.Keywords : Cryptography, Digital Image,Algorithm,ICE.


2016 ◽  
Vol 2 (2) ◽  
pp. 214-225
Author(s):  
Pas Mahyu Akhirianto ◽  
Anita B. Wandanaya ◽  
Opan Mustopah

In the development of technology that is so advanced today, especially in the field of communication and information, maintaining privacy is something that absolutely must be done for each individual. Rapoport (in Soesilo, 1998) defines privacy as an ability to control the interaction, the ability to acquire options and the ability to achieve the desired interaction. Nowadays, a lot of things that can be done by using the internet, such as selling, social interacting through social media (Social Media) such as Facebook, learn, or just read the news through the portal of electronic media, and so forth. Most of the activities that can be done on the internet, requires personal data of its users, where the issue of privacy is of onsiderableconcern. As the development of information and communication technology in this case the Internet, the technology used to protect all personal data users also grown and will continue to evolve into more sophisticated. For this reason the author took the initiative to create a Endesapp application program, which aims to facilitate a person or agency who frequently exchange data in the form of files through the Internet. With so security in maintaining personal data even be increased as well as the possibility of the spread of sensitive data has been poor. In this study, the method used is to design programs shaped application file encryption and decryption web-based cryptographic techniques to the type of algorithm that is supported is 3DES ( Triple DES ) , AES - 128 ( Advanced encyption Standard) , AES - 192 and AES - 256.


2020 ◽  
Vol 12 (1) ◽  
pp. 15173-15180
Author(s):  
Nikhil Joshi ◽  
Hemant Ghate ◽  
Sameer Padhye

There exists substantial literature for capturing digital images of insect specimens for taxonomy purposes but very few papers are available on post processing of these images.  We present a few techniques for editing digital images of insects using Adobe® Photoshop® which can be performed in a relatively short amount of time.  The results clearly show that techniques using a combination of options like Curves, Dodge/Burn, Hue/Saturation and Lab Color mode in the software, enhance the quality of the original image without changing any taxonomic information.  These methods applied in different combinations can be used for taxonomy of any insect taxon.  We also caution the readers of the abuse of such techniques in context of taxonomy. 


d'CARTESIAN ◽  
2013 ◽  
Vol 2 (2) ◽  
pp. 1
Author(s):  
Gybert Saselah ◽  
Winsy Weku ◽  
Luther Latumakulita

Abstract Often the digital image can be contaminated with noise,  which usually occurs in the process of retrieval or storage of digital images and delivery process either via satellite or  cable . By using the technique of filtering noise reduction process will be performed on a digital image that has previously been given Gaussian noise and followed by a Similarity Measurement to identify similarities between  image filtered and original image. This study was conducted to determine the appropriate filtering techniques to reduce the Gaussian noise. Image processing in this study composed by the input image and read the image matrix, converting images, adding noise, denoising digital images by applying filters performed using Matlab R2012a software ( version 7.14.0.739) . Application of Gaussian filter with a value of = 1.0 produce a digital image that is closest to the original image than the application of a Gaussian filter with another value, for  . As for the application of the Wiener filter is seen that the greater the value, the resulting digital image will be closer to the original image. For further research can be done on other types of noise or to a combination of two or more noise. Keywords : Digital Image , Noise , Filter , Similarity Measurement. Abstrak Seringkali citra digital dapat terkontaminasi derau (noise), yang biasanya terjadi pada proses pengambilan ataupun penyimpanan citra digital serta proses pengiriman citra digital baik melalui satelit maupun melalui kabel juga. Dengan menggunakan teknik filtering akan dilakukan proses pengurangan noise pada suatu citra digital yang sebelumnya telah diberi Gaussian noise dan dilanjutkan dengan Similarity Measurement untuk mengidentifikasi kesamaan citra digital hasil filtering dengan citra original. Penelitian ini dilakukan untuk menentukan teknik filtering yang tepat untuk mengurangi Gaussian noise. Proses pengolahan citra dalam penelitian ini terdiri dengan proses input gambar dan membaca matriks citra, konversi citra, menambahkan noise, denoising citra digital dengan menerapkan filter yang dilakukan dengan menggunakan software Matlab R2012a (versi 7.14.0.739). Penerapan Gaussian filter dengan nilai = 1,0 menghasilkan citra digital yang paling mendekati citra original dibandingkan dengan penerapan Gaussian filter dengan nilai  lain, dimana . Sedangkan untuk penerapan Wiener filter terlihat bahwa semakin besar nilai , maka citra digital yang dihasilkan akan semakin mendekati citra original. Untuk penelitian selanjutnya dapat dilakukan pada jenis noise lain ataupun untuk gabungan dua noise atau lebih. Kata kunci: Citra digital, Noise, Filter, Similarity Measurement


2020 ◽  
Vol 55 (2) ◽  
Author(s):  
Azal Habeeb

Information is always being transmitted through the internet. Securing that information is an important issue that programmers need to take into consideration. There are several ways to protect digital images, one of which is steganography, a method of encryption that encrypts information inside another type of information such as images. In this research, we propose a new technique to protect information from hacking. We have used the process of hiding. There are many techniques to secure the image such as hiding information inside other information as in steganography. In this paper, we introduce a new method to protect the information from theft. We used encryption to encrypt the text by using the password between the sender and the receiver. After that we used the least significant bit technique to hide the text in the image. Finally, we applied the proposed method in the MATLAB program.


Author(s):  
Minh Thanh Tạ

This paper proposes a new watermarking method for digital image by composing the DWT-QIM based embedding with visual secret sharing (VSS) method. Firstly, the watermark image is separated into $n$ shares by using the $k-out-of-n$ method, called $(k,n)$ visual secret sharing. One of share is employed in order to embed into the original image for copyright protection. Another $(n-1)$ of shares are registered with Vietnam Copyright Department. When the dispute happens, the verifier can extract the watermark information from the watermarked image, then, decode it with $(k-1)$ shares chosen from $(n-1)$ shares to achieve the copyright information. Our experimental results show that our proposed method works efficiently on the digital images.


Cyber Crime ◽  
2013 ◽  
pp. 587-599
Author(s):  
Nikos Tsirakis

This chapter describes image watermarking, the most common and widespread category of media files are images. The evolution of the Internet and the ease by which images can be duplicated and distributed has led to the need for effective copyright protection tools and techniques in order to provide a secure way to the producers and the owners of these media files. These techniques are described below with an introduction to information hiding. Various software products have been introduced with an aim to address these growing concerns; some categories are presented here. The fundamental technique which allows an individual to add hidden copyright notices or other verification messages to digital images is called digital image watermarking and constitutes the main part of the chapter. Finally authors provide future trends and directions of image watermarking.


Sign in / Sign up

Export Citation Format

Share Document