An Enhancement of One Time Pad Based on Monoalphabeth Caesar Cipher to Secure Grayscale Image

Authors

  • Christy Atika Sari Universitas Dian Nuswantoro
  • Lalang Erawan Universitas Dian Nuswantoro
  • Eko Hari Rachmawanto Universitas Dian Nuswantoro
  • De Rosal Ignatius Moses Setiadi Universitas Dian Nuswantoro
  • Tan Samuel Permana Universitas Dian Nuswantoro

DOI:

https://doi.org/10.33633/jais.v2i2.1616

Abstract

Image is an object that has been used by various people since long ago. Utilization of these images evolve in line with advances in technology. Image in this information technology era is not only in a physical form, there is also a form of so-called digital image. Many people use digital images for personal use, so prone to be manipulated by others. Cryptographic technique, such as Caesar Cipher and OTP is a security techniques that can be applied to the digital image to avoid manipulation or theft of data image. The result is, an image can be read only by the sender and the recipient's image alone. Combined the two algorithms have fast turnaround time, up to 0.017791 seconds for the image to the size of 512x341 and 0.032302 seconds for the image to the size of 768x512. In addition, the resulting image has a very low degree of similarity,  with the highest PSNR value obtained is 6.8653 dB. It can be concluded that the combined algorithm and OTP Caesar Cipher algorithm is fast and difficult to solve.

References

J. Thakur and N. Kumar, “DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis,†Int. J. Emerg. Technol. Adv. Eng., vol. 1, no. 2, pp. 6–12, 2011.

M. G. V. Kumar and U. S. Ragupathy, “A Survey on current key issues and status in cryptography,†in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 205–210.

A. Blair, “Learning the Caesar and Vigenere Cipher by hierarchical evolutionary re-combination,†in 2013 IEEE Congress on Evolutionary Computation, 2013, pp. 605–612.

C. A. Sari, E. H. Rachmawanto, D. W. Utomo, and R. R. Sani, “Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting,†J. Appl. Intell. Syst., vol. 1, no. 3, pp. 179–190, 2016.

D. R. I. M. Setiadi, E. H. Rachmawanto, and C. Sari, “Secure Image Steganography Algorithm Based on DCT with OTP Encryption,†J. Appl. Intell. Syst., vol. 2, no. 1, pp. 1–11, 2017.

A. Al-haj and H. Abdel-nabi, “Digital Image Security Based on Data Hiding and Cryptography,†in International Conference on Information Management Copyright, 2017, pp. 437–440.

L. Erawan, C. A. Sari, and E. H. Rachmawanto, “Lalang_Erawan_Implementasi_Kriptografi_Simetris_OTP,†in Seminar Nasional Multidisiplin Ilmu Universitas Budi Luhur Jakarta, 2017.

C. A. Sari and E. H. Rachmawanto, “Gabungan Algoritma Vernam Chiper Dan End of File,†Techno.COM, vol. 13, no. 3, pp. 150–157, 2014.

E. H. Rachmawanto and C. A. Sari, “Keamanan File Menggunakan Teknik Kriptografi Shift Cipher,†Techno.COM, vol. 14, no. 4, pp. 329–335, 2015.

A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, “Digital Image Steganography : Survey and Analysis of Current Methods,†Signal Processing, vol. 90, no. 3, pp. 727–752, 2010.

C. Sari, E. Rachmawanto, Y. Astuti, and L. Umaroh, “Optimasi penyandian file menggunakan kriptografi shift cipher,†in Seminar Multi Disiplin Ilmu Unisbank (SENDI_U) ke-2 Semarang, 2016.

Y. P. Astuti, E. H. Rachmawanto, and C. A. Sari, “Optimasi Enkripsi Password Menggunakan Algoritma Blowfish,†Techno.COM, vol. 15, no. 1, pp. 15–21, 2016.

X. Li, W. Zhang, B. Ou, and B. Yang, “A brief review on reversible data hiding: Current techniques and future prospects,†in 2IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP), 2014, pp. 426–430.

R. Jain and J. B. Sharma, “Symmetric color image encryption algorithm using fractional DRPM and chaotic baker map,†in 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2016, pp. 1835–1840.

A. Goswami and S. Khandelwal, “Hybrid DCT-DWT Digital Image Steganography,†Int. J. Adv. Res. Comput. Commun. Eng. Vol., vol. 5, no. 6, pp. 228–233, 20 99o16.

Downloads

Published

2018-08-03