Issue
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Visual Analysis Based on CMY and RGB Image Cryptography Using Vigenere and Beaufort Cipher
Corresponding Author(s) : Christy Atika Sari
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control,
Vol. 8, No. 2, May 2023
Abstract
The achievement of visual aspects and image security often cannot meet visibility standards, for example the acquisition of PSNR and UACI NPCR values. To increase security, this research has implemented a combination of the Vigenere cipher and Beaufort and the use of Fibonacci as a randomizer. The combination of the Vigenere Cipher and Beaufort Cipher substitution algorithms with the Fibonacci technique can be applied to encrypt color images in RGB and CMY, with a size of 256x256 pixels and in .bmp format. The Fibonacci cut-off value used in this study is 10000. The highest entropy value of the cipher image peppers.bmp is 7,991. The lowest PSNR cipher image value is accordion.bmp where for RGB it is 5,439 dB and for CMY it is 5,403 dB. accordion.bmp's highest UACI value is 44.018% for RGB and 44.312% for CMY. The NPCR value in the airplane.bmp image has the highest value in RGB of 99.792% and for CMY the highest value is in splash.bmp with a value of 99.798%. Evaluation of the decryption results shows that the decryption process can run perfectly as indicated by the values of MSE=0, PSNR=inf, UACI and NPCR=0%. Therefore, encrypt and decrypt was proven that the results obtained in the visual aspect are very good.
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- F. Anwar, E. H. Rachmawanto, C. A. Sari, and de Rosal Ignatius Moses Setiadi, “StegoCrypt Scheme using LSB-AES Base64,” in 2019 International Conference on Information and Communications Technology, ICOIACT 2019, 2019. https://doi.org/10.1109/ICOIACT46704.2019.8938567
- C. Irawan, D. R. I. Moses Setiadi, E. H. Rachmawanto, C. A. Sari, and M. Doheir, “Hybrid Encryption using Confused and Stream Cipher to Improved Medical Images Security,” in Journal of Physics: Conference Series, 2019, vol. 1201, no. 1. https://doi.org/10.1088/1742-6596/1201/1/012022
- A. Al-haj and H. Abdel-nabi, “Digital Image Security Based on Data Hiding and Cryptography,” in International Conference on Information Management Copyright, 2017, pp. 437–440. https://doi.org/10.1109/INFOMAN.2017.7950423
- P. Patel and Y. Patel, “Secure and Authentic DCT Image Steganography through DWT - SVD Based Digital Watermarking with RSA Encryption,” in 2015 Fifth International Conference on Communication Systems and Network Technologies, 2015, pp. 736–739. https://doi.org/10.1109/CSNT.2015.193
- S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017. https://doi.org/10.17577/IJERTV6IS010245
- C. J. Mitchell, “On the Security of 2-Key Triple DES,” IEEE Trans. Inf. Theory, vol. 62, no. 11, pp. 6260–6267, Nov. 2016. https://doi.org/10.1109/TIT.2016.2611003
- Z. E. Rasjid, B. Soewito, G. Witjaksono, and E. Abdurachman, “A review of collisions in cryptographic hash function used in digital forensic tools,” Procedia Comput. Sci., vol. 116, pp. 381–392, 2017. https://doi.org/10.1016/j.procs.2017.10.072
- Vittal Kumar Mittal | Manish Mukhija, “Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique,” Int. J. Trend Sci. Res. Dev. Int. J. Trend Sci. Res. Dev., vol. 3, no. 5, pp. 1936–1939, 2019.
- E. H. Rachmawanto, D. R. I. M. Setiadi, C. A. Sari, and N. Rijati, “Imperceptible and secure image watermarking using DCT and random spread technique,” TELKOMNIKA (Telecommunication Comput. Electron. Control., vol. 17, no. 4, p. 1750, Aug. 2019. http://doi.org/10.12928/telkomnika.v17i4.9227
- R. Naoum, A. Shihab, and S. Alhamouz, “Enhanced Image Steganography System based on Discrete Wavelet Transformation and Resilient Back-Propagation,” Int. J. Comput. Sci. Netw. Secur., vol. 16, no. 1, pp. 114–122, 2016.
- D. Sinaga, C. Umam, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Teknik Super Enkripsi Menggunakan Transposisi Kolom Berbasis Vigenere Cipher Pada Citra Digital,” Din. Rekayasa, vol. 14, no. 1, p. 57, 2018. http://dx.doi.org/10.20884/1.dr.2018.14.1.198
- R. U. Marsal, F. Arnia, and R. Adriman, “Menggunakan Modifikasi Algoritma,” J. Online Tek. Elektro, vol. 3, no. 3, pp. 6–10, 2018.
- D. R. I. M. Setiadi, C. Jatmoko, E. H. Rachmawanto, and C. A. Sari, “Kombinasi Cipher Subtitusi ( Beaufort Dan Vigenere ) Pada Citra Digital,” Proceeding SENDI_U, pp. 52–57, 2018.
- I. L. Firdaus, R. Marwati, and R. Sispiyati, “Aplikasi Kriptografi Komposisi One Time Pad Cipher Dan Affine Cipher,” J. EurekaMatika, vol. 5, no. 2, pp. 42–51, 2017. https://doi.org/10.17509/jem.v5i2.9597
- F. Al Isfahani and F. Nugraha, “Implementasi Steganografi LSB dengan Enkripsi Base64 Pada Citra dengan Ruang Warna CMYK,” Sci. Comput. Sci. Informatics J., pp. 1–8, 2019.
- M. A. Maricar and N. P. Sastra, “Efektivitas Pesan Teks Dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi,” Maj. Ilm. Teknol. Elektro, vol. 17, no. 1, p. 59, 2018. https://doi.org/10.24843/MITE.2018.v17i01.P08
- A. Ajmera, S. S. Ghosh, and T. Vijayetha, “Secure LSB Steganography over Modified Vigenère-AES Cipher and Modified Interrupt Key-AES Cipher,” in 2018 IEEE Punecon, 2018, pp. 1–7. https://doi.org/10.1109/PUNECON.2018.8745393
References
F. Anwar, E. H. Rachmawanto, C. A. Sari, and de Rosal Ignatius Moses Setiadi, “StegoCrypt Scheme using LSB-AES Base64,” in 2019 International Conference on Information and Communications Technology, ICOIACT 2019, 2019. https://doi.org/10.1109/ICOIACT46704.2019.8938567
C. Irawan, D. R. I. Moses Setiadi, E. H. Rachmawanto, C. A. Sari, and M. Doheir, “Hybrid Encryption using Confused and Stream Cipher to Improved Medical Images Security,” in Journal of Physics: Conference Series, 2019, vol. 1201, no. 1. https://doi.org/10.1088/1742-6596/1201/1/012022
A. Al-haj and H. Abdel-nabi, “Digital Image Security Based on Data Hiding and Cryptography,” in International Conference on Information Management Copyright, 2017, pp. 437–440. https://doi.org/10.1109/INFOMAN.2017.7950423
P. Patel and Y. Patel, “Secure and Authentic DCT Image Steganography through DWT - SVD Based Digital Watermarking with RSA Encryption,” in 2015 Fifth International Conference on Communication Systems and Network Technologies, 2015, pp. 736–739. https://doi.org/10.1109/CSNT.2015.193
S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017. https://doi.org/10.17577/IJERTV6IS010245
C. J. Mitchell, “On the Security of 2-Key Triple DES,” IEEE Trans. Inf. Theory, vol. 62, no. 11, pp. 6260–6267, Nov. 2016. https://doi.org/10.1109/TIT.2016.2611003
Z. E. Rasjid, B. Soewito, G. Witjaksono, and E. Abdurachman, “A review of collisions in cryptographic hash function used in digital forensic tools,” Procedia Comput. Sci., vol. 116, pp. 381–392, 2017. https://doi.org/10.1016/j.procs.2017.10.072
Vittal Kumar Mittal | Manish Mukhija, “Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique,” Int. J. Trend Sci. Res. Dev. Int. J. Trend Sci. Res. Dev., vol. 3, no. 5, pp. 1936–1939, 2019.
E. H. Rachmawanto, D. R. I. M. Setiadi, C. A. Sari, and N. Rijati, “Imperceptible and secure image watermarking using DCT and random spread technique,” TELKOMNIKA (Telecommunication Comput. Electron. Control., vol. 17, no. 4, p. 1750, Aug. 2019. http://doi.org/10.12928/telkomnika.v17i4.9227
R. Naoum, A. Shihab, and S. Alhamouz, “Enhanced Image Steganography System based on Discrete Wavelet Transformation and Resilient Back-Propagation,” Int. J. Comput. Sci. Netw. Secur., vol. 16, no. 1, pp. 114–122, 2016.
D. Sinaga, C. Umam, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Teknik Super Enkripsi Menggunakan Transposisi Kolom Berbasis Vigenere Cipher Pada Citra Digital,” Din. Rekayasa, vol. 14, no. 1, p. 57, 2018. http://dx.doi.org/10.20884/1.dr.2018.14.1.198
R. U. Marsal, F. Arnia, and R. Adriman, “Menggunakan Modifikasi Algoritma,” J. Online Tek. Elektro, vol. 3, no. 3, pp. 6–10, 2018.
D. R. I. M. Setiadi, C. Jatmoko, E. H. Rachmawanto, and C. A. Sari, “Kombinasi Cipher Subtitusi ( Beaufort Dan Vigenere ) Pada Citra Digital,” Proceeding SENDI_U, pp. 52–57, 2018.
I. L. Firdaus, R. Marwati, and R. Sispiyati, “Aplikasi Kriptografi Komposisi One Time Pad Cipher Dan Affine Cipher,” J. EurekaMatika, vol. 5, no. 2, pp. 42–51, 2017. https://doi.org/10.17509/jem.v5i2.9597
F. Al Isfahani and F. Nugraha, “Implementasi Steganografi LSB dengan Enkripsi Base64 Pada Citra dengan Ruang Warna CMYK,” Sci. Comput. Sci. Informatics J., pp. 1–8, 2019.
M. A. Maricar and N. P. Sastra, “Efektivitas Pesan Teks Dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi,” Maj. Ilm. Teknol. Elektro, vol. 17, no. 1, p. 59, 2018. https://doi.org/10.24843/MITE.2018.v17i01.P08
A. Ajmera, S. S. Ghosh, and T. Vijayetha, “Secure LSB Steganography over Modified Vigenère-AES Cipher and Modified Interrupt Key-AES Cipher,” in 2018 IEEE Punecon, 2018, pp. 1–7. https://doi.org/10.1109/PUNECON.2018.8745393