Quick jump to page content
  • Main Navigation
  • Main Content
  • Sidebar

  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  • Register
  • Login
  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  1. Home
  2. Archives
  3. Vol. 8, No. 2, May 2023
  4. Articles

Issue

Vol. 8, No. 2, May 2023

Issue Published : May 31, 2023
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Visual Analysis Based on CMY and RGB Image Cryptography Using Vigenere and Beaufort Cipher

https://doi.org/10.22219/kinetik.v8i2.1664
Christy Atika Sari
Universitas Dian Nuswantoro
https://orcid.org/0000-0002-7296-5210
Danang Wahyu Utomo
Universitas Dian Nuswantoro
Mohamed A S Doheir
University Malaysia of Computer and Engineering

Corresponding Author(s) : Christy Atika Sari

atika88.dinus@gmail.com

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, Vol. 8, No. 2, May 2023
Article Published : May 31, 2023

Share
WA Share on Facebook Share on Twitter Pinterest Email Telegram
  • Abstract
  • Cite
  • References
  • Authors Details

Abstract

The achievement of visual aspects and image security often cannot meet visibility standards, for example the acquisition of PSNR and UACI NPCR values. To increase security, this research has implemented a combination of the Vigenere cipher and Beaufort and the use of Fibonacci as a randomizer. The combination of the Vigenere Cipher and Beaufort Cipher substitution algorithms with the Fibonacci technique can be applied to encrypt color images in RGB and CMY, with a size of 256x256 pixels and in .bmp format. The Fibonacci cut-off value used in this study is 10000. The highest entropy value of the cipher image peppers.bmp is 7,991. The lowest PSNR cipher image value is accordion.bmp where for RGB it is 5,439 dB and for CMY it is 5,403 dB. accordion.bmp's highest UACI value is 44.018% for RGB and 44.312% for CMY. The NPCR value in the airplane.bmp image has the highest value in RGB of 99.792% and for CMY the highest value is in splash.bmp with a value of 99.798%. Evaluation of the decryption results shows that the decryption process can run perfectly as indicated by the values of MSE=0, PSNR=inf, UACI and NPCR=0%. Therefore, encrypt and decrypt was proven that the results obtained in the visual aspect are very good.

Keywords

Vigenere Cipher Beaufort Cipher Fibonacci Color image, Cryptography
Atika Sari, C. ., Utomo, D. W., & Doheir, M. A. S. (2023). Visual Analysis Based on CMY and RGB Image Cryptography Using Vigenere and Beaufort Cipher. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 8(2). https://doi.org/10.22219/kinetik.v8i2.1664
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver
Download Citation
Endnote/Zotero/Mendeley (RIS)
BibTeX
References
  1. F. Anwar, E. H. Rachmawanto, C. A. Sari, and de Rosal Ignatius Moses Setiadi, “StegoCrypt Scheme using LSB-AES Base64,” in 2019 International Conference on Information and Communications Technology, ICOIACT 2019, 2019. https://doi.org/10.1109/ICOIACT46704.2019.8938567
  2. C. Irawan, D. R. I. Moses Setiadi, E. H. Rachmawanto, C. A. Sari, and M. Doheir, “Hybrid Encryption using Confused and Stream Cipher to Improved Medical Images Security,” in Journal of Physics: Conference Series, 2019, vol. 1201, no. 1. https://doi.org/10.1088/1742-6596/1201/1/012022
  3. A. Al-haj and H. Abdel-nabi, “Digital Image Security Based on Data Hiding and Cryptography,” in International Conference on Information Management Copyright, 2017, pp. 437–440. https://doi.org/10.1109/INFOMAN.2017.7950423
  4. P. Patel and Y. Patel, “Secure and Authentic DCT Image Steganography through DWT - SVD Based Digital Watermarking with RSA Encryption,” in 2015 Fifth International Conference on Communication Systems and Network Technologies, 2015, pp. 736–739. https://doi.org/10.1109/CSNT.2015.193
  5. S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017. https://doi.org/10.17577/IJERTV6IS010245
  6. C. J. Mitchell, “On the Security of 2-Key Triple DES,” IEEE Trans. Inf. Theory, vol. 62, no. 11, pp. 6260–6267, Nov. 2016. https://doi.org/10.1109/TIT.2016.2611003
  7. Z. E. Rasjid, B. Soewito, G. Witjaksono, and E. Abdurachman, “A review of collisions in cryptographic hash function used in digital forensic tools,” Procedia Comput. Sci., vol. 116, pp. 381–392, 2017. https://doi.org/10.1016/j.procs.2017.10.072
  8. Vittal Kumar Mittal | Manish Mukhija, “Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique,” Int. J. Trend Sci. Res. Dev. Int. J. Trend Sci. Res. Dev., vol. 3, no. 5, pp. 1936–1939, 2019.
  9. E. H. Rachmawanto, D. R. I. M. Setiadi, C. A. Sari, and N. Rijati, “Imperceptible and secure image watermarking using DCT and random spread technique,” TELKOMNIKA (Telecommunication Comput. Electron. Control., vol. 17, no. 4, p. 1750, Aug. 2019. http://doi.org/10.12928/telkomnika.v17i4.9227
  10. R. Naoum, A. Shihab, and S. Alhamouz, “Enhanced Image Steganography System based on Discrete Wavelet Transformation and Resilient Back-Propagation,” Int. J. Comput. Sci. Netw. Secur., vol. 16, no. 1, pp. 114–122, 2016.
  11. D. Sinaga, C. Umam, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Teknik Super Enkripsi Menggunakan Transposisi Kolom Berbasis Vigenere Cipher Pada Citra Digital,” Din. Rekayasa, vol. 14, no. 1, p. 57, 2018. http://dx.doi.org/10.20884/1.dr.2018.14.1.198
  12. R. U. Marsal, F. Arnia, and R. Adriman, “Menggunakan Modifikasi Algoritma,” J. Online Tek. Elektro, vol. 3, no. 3, pp. 6–10, 2018.
  13. D. R. I. M. Setiadi, C. Jatmoko, E. H. Rachmawanto, and C. A. Sari, “Kombinasi Cipher Subtitusi ( Beaufort Dan Vigenere ) Pada Citra Digital,” Proceeding SENDI_U, pp. 52–57, 2018.
  14. I. L. Firdaus, R. Marwati, and R. Sispiyati, “Aplikasi Kriptografi Komposisi One Time Pad Cipher Dan Affine Cipher,” J. EurekaMatika, vol. 5, no. 2, pp. 42–51, 2017. https://doi.org/10.17509/jem.v5i2.9597
  15. F. Al Isfahani and F. Nugraha, “Implementasi Steganografi LSB dengan Enkripsi Base64 Pada Citra dengan Ruang Warna CMYK,” Sci. Comput. Sci. Informatics J., pp. 1–8, 2019.
  16. M. A. Maricar and N. P. Sastra, “Efektivitas Pesan Teks Dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi,” Maj. Ilm. Teknol. Elektro, vol. 17, no. 1, p. 59, 2018. https://doi.org/10.24843/MITE.2018.v17i01.P08
  17. A. Ajmera, S. S. Ghosh, and T. Vijayetha, “Secure LSB Steganography over Modified Vigenère-AES Cipher and Modified Interrupt Key-AES Cipher,” in 2018 IEEE Punecon, 2018, pp. 1–7. https://doi.org/10.1109/PUNECON.2018.8745393
Read More

References


F. Anwar, E. H. Rachmawanto, C. A. Sari, and de Rosal Ignatius Moses Setiadi, “StegoCrypt Scheme using LSB-AES Base64,” in 2019 International Conference on Information and Communications Technology, ICOIACT 2019, 2019. https://doi.org/10.1109/ICOIACT46704.2019.8938567

C. Irawan, D. R. I. Moses Setiadi, E. H. Rachmawanto, C. A. Sari, and M. Doheir, “Hybrid Encryption using Confused and Stream Cipher to Improved Medical Images Security,” in Journal of Physics: Conference Series, 2019, vol. 1201, no. 1. https://doi.org/10.1088/1742-6596/1201/1/012022

A. Al-haj and H. Abdel-nabi, “Digital Image Security Based on Data Hiding and Cryptography,” in International Conference on Information Management Copyright, 2017, pp. 437–440. https://doi.org/10.1109/INFOMAN.2017.7950423

P. Patel and Y. Patel, “Secure and Authentic DCT Image Steganography through DWT - SVD Based Digital Watermarking with RSA Encryption,” in 2015 Fifth International Conference on Communication Systems and Network Technologies, 2015, pp. 736–739. https://doi.org/10.1109/CSNT.2015.193

S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017. https://doi.org/10.17577/IJERTV6IS010245

C. J. Mitchell, “On the Security of 2-Key Triple DES,” IEEE Trans. Inf. Theory, vol. 62, no. 11, pp. 6260–6267, Nov. 2016. https://doi.org/10.1109/TIT.2016.2611003

Z. E. Rasjid, B. Soewito, G. Witjaksono, and E. Abdurachman, “A review of collisions in cryptographic hash function used in digital forensic tools,” Procedia Comput. Sci., vol. 116, pp. 381–392, 2017. https://doi.org/10.1016/j.procs.2017.10.072

Vittal Kumar Mittal | Manish Mukhija, “Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique,” Int. J. Trend Sci. Res. Dev. Int. J. Trend Sci. Res. Dev., vol. 3, no. 5, pp. 1936–1939, 2019.

E. H. Rachmawanto, D. R. I. M. Setiadi, C. A. Sari, and N. Rijati, “Imperceptible and secure image watermarking using DCT and random spread technique,” TELKOMNIKA (Telecommunication Comput. Electron. Control., vol. 17, no. 4, p. 1750, Aug. 2019. http://doi.org/10.12928/telkomnika.v17i4.9227

R. Naoum, A. Shihab, and S. Alhamouz, “Enhanced Image Steganography System based on Discrete Wavelet Transformation and Resilient Back-Propagation,” Int. J. Comput. Sci. Netw. Secur., vol. 16, no. 1, pp. 114–122, 2016.

D. Sinaga, C. Umam, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Teknik Super Enkripsi Menggunakan Transposisi Kolom Berbasis Vigenere Cipher Pada Citra Digital,” Din. Rekayasa, vol. 14, no. 1, p. 57, 2018. http://dx.doi.org/10.20884/1.dr.2018.14.1.198

R. U. Marsal, F. Arnia, and R. Adriman, “Menggunakan Modifikasi Algoritma,” J. Online Tek. Elektro, vol. 3, no. 3, pp. 6–10, 2018.

D. R. I. M. Setiadi, C. Jatmoko, E. H. Rachmawanto, and C. A. Sari, “Kombinasi Cipher Subtitusi ( Beaufort Dan Vigenere ) Pada Citra Digital,” Proceeding SENDI_U, pp. 52–57, 2018.

I. L. Firdaus, R. Marwati, and R. Sispiyati, “Aplikasi Kriptografi Komposisi One Time Pad Cipher Dan Affine Cipher,” J. EurekaMatika, vol. 5, no. 2, pp. 42–51, 2017. https://doi.org/10.17509/jem.v5i2.9597

F. Al Isfahani and F. Nugraha, “Implementasi Steganografi LSB dengan Enkripsi Base64 Pada Citra dengan Ruang Warna CMYK,” Sci. Comput. Sci. Informatics J., pp. 1–8, 2019.

M. A. Maricar and N. P. Sastra, “Efektivitas Pesan Teks Dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi,” Maj. Ilm. Teknol. Elektro, vol. 17, no. 1, p. 59, 2018. https://doi.org/10.24843/MITE.2018.v17i01.P08

A. Ajmera, S. S. Ghosh, and T. Vijayetha, “Secure LSB Steganography over Modified Vigenère-AES Cipher and Modified Interrupt Key-AES Cipher,” in 2018 IEEE Punecon, 2018, pp. 1–7. https://doi.org/10.1109/PUNECON.2018.8745393

Author biographies is not available.
Download this PDF file
PDF
Statistic
Read Counter : 1 Download : 15

Downloads

Download data is not yet available.

Quick Link

  • Author Guidelines
  • Download Manuscript Template
  • Peer Review Process
  • Editorial Board
  • Reviewer Acknowledgement
  • Aim and Scope
  • Publication Ethics
  • Licensing Term
  • Copyright Notice
  • Open Access Policy
  • Important Dates
  • Author Fees
  • Indexing and Abstracting
  • Archiving Policy
  • Scopus Citation Analysis
  • Statistic
  • Article Withdrawal

Meet Our Editorial Team

Ir. Amrul Faruq, M.Eng., Ph.D
Editor in Chief
Universitas Muhammadiyah Malang
Google Scholar Scopus
Agus Eko Minarno
Editorial Board
Universitas Muhammadiyah Malang
Google Scholar  Scopus
Hanung Adi Nugroho
Editorial Board
Universitas Gadjah Mada
Google Scholar Scopus
Roman Voliansky
Editorial Board
Dniprovsky State Technical University, Ukraine
Google Scholar Scopus
Read More
 

KINETIK: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
eISSN : 2503-2267
pISSN : 2503-2259


Address

Program Studi Elektro dan Informatika

Fakultas Teknik, Universitas Muhammadiyah Malang

Jl. Raya Tlogomas 246 Malang

Phone 0341-464318 EXT 247

Contact Info

Principal Contact

Amrul Faruq
Phone: +62 812-9398-6539
Email: faruq@umm.ac.id

Support Contact

Fauzi Dwi Setiawan Sumadi
Phone: +62 815-1145-6946
Email: fauzisumadi@umm.ac.id

© 2020 KINETIK, All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License