An Enhancement of One Time Pad Based on Monoalphabeth Caesar Cipher to Secure Grayscale Image
DOI:
https://doi.org/10.33633/jais.v2i2.1616Abstract
Image is an object that has been used by various people since long ago. Utilization of these images evolve in line with advances in technology. Image in this information technology era is not only in a physical form, there is also a form of so-called digital image. Many people use digital images for personal use, so prone to be manipulated by others. Cryptographic technique, such as Caesar Cipher and OTP is a security techniques that can be applied to the digital image to avoid manipulation or theft of data image. The result is, an image can be read only by the sender and the recipient's image alone. Combined the two algorithms have fast turnaround time, up to 0.017791 seconds for the image to the size of 512x341 and 0.032302 seconds for the image to the size of 768x512. In addition, the resulting image has a very low degree of similarity, Â with the highest PSNR value obtained is 6.8653 dB. It can be concluded that the combined algorithm and OTP Caesar Cipher algorithm is fast and difficult to solve.References
J. Thakur and N. Kumar, “DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis,†Int. J. Emerg. Technol. Adv. Eng., vol. 1, no. 2, pp. 6–12, 2011.
M. G. V. Kumar and U. S. Ragupathy, “A Survey on current key issues and status in cryptography,†in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 205–210.
A. Blair, “Learning the Caesar and Vigenere Cipher by hierarchical evolutionary re-combination,†in 2013 IEEE Congress on Evolutionary Computation, 2013, pp. 605–612.
C. A. Sari, E. H. Rachmawanto, D. W. Utomo, and R. R. Sani, “Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting,†J. Appl. Intell. Syst., vol. 1, no. 3, pp. 179–190, 2016.
D. R. I. M. Setiadi, E. H. Rachmawanto, and C. Sari, “Secure Image Steganography Algorithm Based on DCT with OTP Encryption,†J. Appl. Intell. Syst., vol. 2, no. 1, pp. 1–11, 2017.
A. Al-haj and H. Abdel-nabi, “Digital Image Security Based on Data Hiding and Cryptography,†in International Conference on Information Management Copyright, 2017, pp. 437–440.
L. Erawan, C. A. Sari, and E. H. Rachmawanto, “Lalang_Erawan_Implementasi_Kriptografi_Simetris_OTP,†in Seminar Nasional Multidisiplin Ilmu Universitas Budi Luhur Jakarta, 2017.
C. A. Sari and E. H. Rachmawanto, “Gabungan Algoritma Vernam Chiper Dan End of File,†Techno.COM, vol. 13, no. 3, pp. 150–157, 2014.
E. H. Rachmawanto and C. A. Sari, “Keamanan File Menggunakan Teknik Kriptografi Shift Cipher,†Techno.COM, vol. 14, no. 4, pp. 329–335, 2015.
A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, “Digital Image Steganography : Survey and Analysis of Current Methods,†Signal Processing, vol. 90, no. 3, pp. 727–752, 2010.
C. Sari, E. Rachmawanto, Y. Astuti, and L. Umaroh, “Optimasi penyandian file menggunakan kriptografi shift cipher,†in Seminar Multi Disiplin Ilmu Unisbank (SENDI_U) ke-2 Semarang, 2016.
Y. P. Astuti, E. H. Rachmawanto, and C. A. Sari, “Optimasi Enkripsi Password Menggunakan Algoritma Blowfish,†Techno.COM, vol. 15, no. 1, pp. 15–21, 2016.
X. Li, W. Zhang, B. Ou, and B. Yang, “A brief review on reversible data hiding: Current techniques and future prospects,†in 2IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP), 2014, pp. 426–430.
R. Jain and J. B. Sharma, “Symmetric color image encryption algorithm using fractional DRPM and chaotic baker map,†in 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2016, pp. 1835–1840.
A. Goswami and S. Khandelwal, “Hybrid DCT-DWT Digital Image Steganography,†Int. J. Adv. Res. Comput. Commun. Eng. Vol., vol. 5, no. 6, pp. 228–233, 20 99o16.
Downloads
Published
Issue
Section
License
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).