ENHANCE SECURITY IMAGE ON PASSENGER COMBINATION ALGORITHM ARNOLD CAT MAP (ACM) AND RIVEST SHAMIR ADLEMAN (RSA)
Abstract
At present, the security and confidentiality of the data or information is a critical thing and the increasingly widespread use of image data in a variety of fields. Therefore, the security of image data from unauthorized access becomes necessary. There are a variety of techniques to improve the safety of the data or information has been developed, one of which is Cryptography technique or so-called encryption/decryption technique. Cryptography is the science of keeping messages by changing the data or information into a form that is different or can not be recognized. To increase security on the image we can take more than one encryption algorithm, and a second cryptography algorithm to do encryption and decryption can be the way. Cryptographic algorithms commonly used today and proved its strength especially for the digital image is Algorithm with Chaos system. Arnold's Cat Map (ACM) is one of a chaos-based algorithm that can be used to encrypt the image file and to improve security on that image then use new algorithms are algorithms Rivest Shamir Adleman (RSA) algorithm, known as the standard in the field of cryptography. This research aims to optimize the security image jpg format by combining two cryptographic algorithms are algorithms ACM and the RSA algorithm so expect the strength of the encrypted with the algorithms are complicated to be solved.The aims of the comparison MSE showed good results where quality RGB original image with the image of an encrypted does not show error , but the value of PSNR between the original image with the image of the encoded still showed noise where PSNR finally to red (r) = 16.8955, green (g) = -1.9952, blue (b) = -7.1882. Comparison of the time required for each encryption-decryption is approximately 0.1 seconds to 0.4 seconds.
References
Lin, Ch-H., Chen, T-H., dan Wu, Ch-S. 2013, A batch image encryption scheme based on chaining random grids. Sharif University of Technology, Scientia Iranica D (2013) 20 (3), 670–681.
Lumbangaol, Rini Wati. 2013, Aplikasi Pengamanan Gambar Dengan Algoritma
Rivest-Shamir Adleman (RSA). Jurnal STMIK Budidarma.
43
Menezes, A. 1997. Handbook of Applied Cryptography. USA: CRC Press, Inc.
Munir, Rinaldi. 2012, Algoritma Enkripsi Citra Digital Berbasis Chaos dengan Penggabungan Teknik Permutasi dan Teknik Substitusi Menggunakan Arnold Cat Map dan Logistic Map. ISSN 2089-8673 Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) Volume 1, Nomor 3, Desember 2012
Rhee, Man Young, 1994, Crytography and Secure Communications. Korea: McGraw-Hill Book Co.
Schneier, B. 1996, Applied Cryptography 2nd Edition, Wiley & Sons.
Sharma, M., Kowar, M.K. 2010, Image Encryption Technique Using Chaotic Schemes: A Review, International Journal of Engineering, Science, and Technology Vol 2 (6) 2010.
Singh, Laiphrakpam Dolendro. Singh, Khumanthem Manglem. 2015, Image Encryption using Elliptic Curve Cryptography, Procedia Computer Science 54 ( 2015 ) 472 – 481 Science Direct
Aryza, S., Abdallah, A. N., bin Khalidin, Z., Lubis, Z., & Jie, M. (2012). A Fast Induction Motor Speed Estimation based on Hybrid Particle Swarm Optimization (HPSO). Physics Procedia, 25, 2109-2115.
Lubis, Z., & Aryza, S. (2017). Analisa Perancangan Penggunakan Mikrokontroler ATMega 8 Sebagai Pengendali dan Sensor Gerak untuk Pendeteksi Gerak Berbasis SMS. JET (Journal of Electrical Technology), 2(3), 66-71.
Aryza, S., Lubis, Z., & Khairunizam, W. (2019, February). Analisis hubungan antara daring dan revolusi industri didalam penerapan ilmu keteknikan. In Seminar Nasional Teknologi Komputer & Sains (SAINTEKS) (Vol. 1, No. 1).