An Enhancement of One Time Pad Based on Monoalphabeth Caesar Cipher to Secure Grayscale Image

Christy Atika Sari, Lalang Erawan, Eko Hari Rachmawanto, De Rosal Ignatius Moses Setiadi, Tan Samuel Permana

Abstract


Image is an object that has been used by various people since long ago. Utilization of these images evolve in line with advances in technology. Image in this information technology era is not only in a physical form, there is also a form of so-called digital image. Many people use digital images for personal use, so prone to be manipulated by others. Cryptographic technique, such as Caesar Cipher and OTP is a security techniques that can be applied to the digital image to avoid manipulation or theft of data image. The result is, an image can be read only by the sender and the recipient's image alone. Combined the two algorithms have fast turnaround time, up to 0.017791 seconds for the image to the size of 512x341 and 0.032302 seconds for the image to the size of 768x512. In addition, the resulting image has a very low degree of similarity,  with the highest PSNR value obtained is 6.8653 dB. It can be concluded that the combined algorithm and OTP Caesar Cipher algorithm is fast and difficult to solve.

Full Text:

PDF

References


J. Thakur and N. Kumar, “DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis,†Int. J. Emerg. Technol. Adv. Eng., vol. 1, no. 2, pp. 6–12, 2011.

M. G. V. Kumar and U. S. Ragupathy, “A Survey on current key issues and status in cryptography,†in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 205–210.

A. Blair, “Learning the Caesar and Vigenere Cipher by hierarchical evolutionary re-combination,†in 2013 IEEE Congress on Evolutionary Computation, 2013, pp. 605–612.

C. A. Sari, E. H. Rachmawanto, D. W. Utomo, and R. R. Sani, “Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting,†J. Appl. Intell. Syst., vol. 1, no. 3, pp. 179–190, 2016.

D. R. I. M. Setiadi, E. H. Rachmawanto, and C. Sari, “Secure Image Steganography Algorithm Based on DCT with OTP Encryption,†J. Appl. Intell. Syst., vol. 2, no. 1, pp. 1–11, 2017.

A. Al-haj and H. Abdel-nabi, “Digital Image Security Based on Data Hiding and Cryptography,†in International Conference on Information Management Copyright, 2017, pp. 437–440.

L. Erawan, C. A. Sari, and E. H. Rachmawanto, “Lalang_Erawan_Implementasi_Kriptografi_Simetris_OTP,†in Seminar Nasional Multidisiplin Ilmu Universitas Budi Luhur Jakarta, 2017.

C. A. Sari and E. H. Rachmawanto, “Gabungan Algoritma Vernam Chiper Dan End of File,†Techno.COM, vol. 13, no. 3, pp. 150–157, 2014.

E. H. Rachmawanto and C. A. Sari, “Keamanan File Menggunakan Teknik Kriptografi Shift Cipher,†Techno.COM, vol. 14, no. 4, pp. 329–335, 2015.

A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, “Digital Image Steganography : Survey and Analysis of Current Methods,†Signal Processing, vol. 90, no. 3, pp. 727–752, 2010.

C. Sari, E. Rachmawanto, Y. Astuti, and L. Umaroh, “Optimasi penyandian file menggunakan kriptografi shift cipher,†in Seminar Multi Disiplin Ilmu Unisbank (SENDI_U) ke-2 Semarang, 2016.

Y. P. Astuti, E. H. Rachmawanto, and C. A. Sari, “Optimasi Enkripsi Password Menggunakan Algoritma Blowfish,†Techno.COM, vol. 15, no. 1, pp. 15–21, 2016.

X. Li, W. Zhang, B. Ou, and B. Yang, “A brief review on reversible data hiding: Current techniques and future prospects,†in 2IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP), 2014, pp. 426–430.

R. Jain and J. B. Sharma, “Symmetric color image encryption algorithm using fractional DRPM and chaotic baker map,†in 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2016, pp. 1835–1840.

A. Goswami and S. Khandelwal, “Hybrid DCT-DWT Digital Image Steganography,†Int. J. Adv. Res. Comput. Commun. Eng. Vol., vol. 5, no. 6, pp. 228–233, 20 99o16.




DOI: https://doi.org/10.33633/jais.v2i2.1616

Article Metrics

Abstract view : 548 times
PDF - 478 times

Refbacks

  • There are currently no refbacks.


Flag Counter

 

 

 

 

Journal of Applied Intelligent System (e-ISSN : 2502-9401p-ISSN : 2503-0493) is published by Department of Informatics Universitas Dian Nuswantoro Semarang and IndoCEISS.

  

 

Journal of Applied Intelligent System indexed by :


This journal is under licensed of Creative Commons Attribution 4.0 International License.

Visitor Stats