Quick jump to page content
  • Main Navigation
  • Main Content
  • Sidebar

  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  • Register
  • Login
  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  1. Home
  2. Archives
  3. Vol. 9, No. 3, August 2024
  4. Articles

Issue

Vol. 9, No. 3, August 2024

Issue Published : Aug 31, 2024
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

A Super Encryption Approach for Enhancing Digital Security using Column Transposition - Hill Cipher for 3D Image Protection

https://doi.org/10.22219/kinetik.v9i3.1984
Lekso Budi Handoko
University of Dian Nuswantoro
Chaerul Umam
University of Dian Nuswantoro

Corresponding Author(s) : Lekso Budi Handoko

handoko@dsn.dinus.ac.id

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, Vol. 9, No. 3, August 2024
Article Published : Aug 30, 2024

Share
WA Share on Facebook Share on Twitter Pinterest Email Telegram
  • Abstract
  • Cite
  • References
  • Authors Details

Abstract

Image encryption is an indispensable technique in the realm of information security, serving as a pivotal mechanism to safeguard visual data against unauthorized access and potential breaches. This study scrutinizes the effectiveness of merging columnar transposition with the Hill Cipher methodologies, unveiling specific metrics from a curated set of sample images. Notably, employing column transposition with the key "JAYA" and the Hill Cipher with the key "UDINUSSMG," the encrypted images underwent rigorous evaluation. 'Lena.png' demonstrated an MSE of 513.32 with a PSNR of 7.89 dB, while 'Peppers.png' and 'Baboon.png' recorded MSE values of 466.67 and 423.92, respectively, with corresponding PSNR figures of 7.12 dB and 7.31 dB. Across all samples, a consistent BER of 50.00% indicated uniform error propagation, while entropy values settled uniformly at 7.9999, highlighting consistent data complexity. While the findings underscore a consistent error rate and complexity, there's a compelling need for further refinement to enhance image quality and security. Moreover, the study proposes future research avenues exploring a three-layer super encryption paradigm, amalgamating columnar transposition, Hill Cipher, and other robust algorithms. This approach aims to fortify encryption methodologies against evolving threats and challenges in data protection, offering heightened resilience and efficacy in safeguarding sensitive information.

Keywords

Image Encryption Columnar Transposition Hill Cipher Super Encryption Quality Measurement
Handoko, L. B., & Umam, C. (2024). A Super Encryption Approach for Enhancing Digital Security using Column Transposition - Hill Cipher for 3D Image Protection. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 9(3), 267-276. https://doi.org/10.22219/kinetik.v9i3.1984
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver
Download Citation
Endnote/Zotero/Mendeley (RIS)
BibTeX
References
  1. E. A. Sofyan, C. A. Sari, H. Rachmawanto, and R. D. Cahyo, “High-Quality Evaluation for Invisible Watermarking Based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD),” Advance Sustainable Science, Engineering and Technology (ASSET), vol. 6, no. 1, 2024. https://doi.org/10.26877/asset.v6i1.17186
  2. V. M. Putrie, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Super Encryption using Transposition-Hill Cipher for Digital Color Image,” in 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), IEEE, Nov. 2018, pp. 152–157. https://doi.org/10.1109/ISRITI.2018.8864361
  3. C. A. Sari, M. H. Dzaki, E. H. Rachmawanto, R. R. Ali, and M. Doheir, “High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 568–580, 2023. https://doi.org/10.22266/ijies2023.0831.46
  4. S. T. Ahmed, D. A. Hammood, R. F. Chisab, A. Al-Naji, and J. Chahl, “Medical Image Encryption: A Comprehensive Review,” Computers, vol. 12, no. 8. Multidisciplinary Digital Publishing Institute (MDPI), Aug. 01, 2023. https://doi.org/10.3390/computers12080160
  5. M. Abu-Faraj et al., “Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps,” Cryptography, vol. 7, no. 2, 2023. https://doi.org/10.3390/cryptography7020020
  6. S. T. Kamal, K. M. Hosny, T. M. Elgindy, M. M. Darwish, and M. M. Fouda, “A new image encryption algorithm for grey and color medical images,” IEEE Access, vol. 9, pp. 37855–37865, 2021. https://doi.org/10.1109/ACCESS.2021.3063237
  7. I. Prayogo Pujiono, E. Hari Rachmawanto, U. K. Abdurrahman Wahid, U. Dian Nuswantoro, and D. Anggriawan Nugroho, “The Implementation of Improved Advanced Encryption Standard and Least Significant Bit for Securing Messages in Images,” 2023.
  8. V. Kakkad, M. Patel, and M. Shah, “Biometric authentication and image encryption for image security in cloud framework,” Multiscale and Multidisciplinary Modeling, Experiments and Design, vol. 2, no. 4, pp. 233–248, Dec. 2019. https://doi.org/10.1007/s41939-019-00049-y
  9. M. Gupta, V. P. Singh, K. K. Gupta, and P. K. Shukla, “An efficient image encryption technique based on two-level security for internet of things,” Multimed Tools Appl, vol. 82, no. 4, pp. 5091–5111, Feb. 2023. https://doi.org/10.1007/s11042-022-12169-8
  10. E. J. G, H. M. A, and F. H. M. S, “Enhanced Security: Implementation of Hybrid Image Steganography Technique using Low-Contrast LSB and AES-CBC Cryptography,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, p. 2022, 2022. https://dx.doi.org/10.14569/IJACSA.2022.01308104
  11. M. S. Abdalzaher, M. M. Fouda, and M. I. Ibrahem, “Data Privacy Preservation and Security in Smart Metering Systems,” Energies, vol. 15, no. 19. MDPI, Oct. 01, 2022. https://doi.org/10.3390/en15197419
  12. P. N. Lone, D. Singh, V. Stoffová, D. C. Mishra, U. H. Mir, and N. Kumar, “Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher,” Mathematics, vol. 10, no. 20, Oct. 2022. https://doi.org/10.3390/math10203878
  13. M. Derese Gietaneh and T. Birara Akele, “Enhancing the Hill Cipher Algorithm and Employing a One Time Pad Key Generation Technique,” Abyssinia Journal of Engineering and Computing Abyss. J. Engg & Comput, vol. 3, no. 1, pp. 1–10, 2023.
  14. H. N. Khalid, A. Hafizah, and M. Aman, “Digital Image Steganography in Spatial Domain: A Critical Study,” 2020.
  15. S. Gupta, K. Saluja, V. Solanki, K. Kaur, P. Singla, and M. Shahid, “Efficient methods for digital image watermarking and information embedding,” Measurement: Sensors, vol. 24, p. 100520, Dec. 2022. https://doi.org/10.1016/j.measen.2022.100521
  16. M. Fadlan, Haryansyah, and Rosmini, “Three Layer Encryption Protocol: an Approach of Super Encryption Algorithm,” in 2021 3rd International Conference on Cybernetics and Intelligent System (ICORIS), IEEE, Oct. 2021, pp. 1–5. https://doi.org/10.1109/ICORIS52787.2021.9649574
  17. M. A. Budiman, Amalia, and N. I. Chayanie, “An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security,” in Journal of Physics: Conference Series, Institute of Physics Publishing, Mar. 2018. https://doi.org/10.1088/1742-6596/978/1/012086
  18. C. Umam, L. B. Handoko, C. A. Sari, E. H. Rachmawanto, and L. A. R. Hakim, “Kombinasi Vigenere dan Autokey Cipher dalam Proses Proteksi SMS Berbasis Android,” Prosiding Sains Nasional dan Teknologi, vol. 12, no. 1, p. 492, Nov. 2022. http://dx.doi.org/10.36499/psnst.v12i1.7108
  19. U. Sara, M. Akter, and M. S. Uddin, “Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study,” Journal of Computer and Communications, vol. 07, no. 03, pp. 8–18, 2019. https://doi.org/10.4236/jcc.2019.73002
  20. D. E. Mfungo and X. Fu, “Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps,” Entropy, vol. 25, no. 11, p. 1478, Oct. 2023. https://doi.org/10.3390/e25111478
  21. B. Zolfaghari and T. Koshiba, “Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap,” Applied System Innovation, vol. 5, no. 3. MDPI, Jun. 01, 2022. https://doi.org/10.3390/asi5030057
  22. M. Kaur, S. Singh, and M. Kaur, “Computational Image Encryption Techniques: A Comprehensive Review,” Mathematical Problems in Engineering, vol. 2021. Hindawi Limited, 2021. https://doi.org/10.1155/2021/5012496
  23. J. Gao, Y. Wang, Z. Song, and S. Wang, “Quantum Image Encryption Based on Quantum DNA Codec and Pixel-Level Scrambling,” Entropy, vol. 25, no. 6, Jun. 2023. https://doi.org/10.3390/e25060865
  24. A. Susanto et al., “Triple layer image security using bit-shift, chaos, and stream encryption,” Bulletin of Electrical Engineering and Informatics, vol. 9, no. 3, pp. 980–987, Jun. 2020. https://doi.org/10.11591/eei.v9i3.2001
  25. A. Arab, M. J. Rostami, and B. Ghavami, “An image encryption method based on chaos system and AES algorithm,” Journal of Supercomputing, vol. 75, no. 10, pp. 6663–6682, Oct. 2019. https://doi.org/10.1007/s11227-019-02878-7
Read More

References


E. A. Sofyan, C. A. Sari, H. Rachmawanto, and R. D. Cahyo, “High-Quality Evaluation for Invisible Watermarking Based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD),” Advance Sustainable Science, Engineering and Technology (ASSET), vol. 6, no. 1, 2024. https://doi.org/10.26877/asset.v6i1.17186

V. M. Putrie, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Super Encryption using Transposition-Hill Cipher for Digital Color Image,” in 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), IEEE, Nov. 2018, pp. 152–157. https://doi.org/10.1109/ISRITI.2018.8864361

C. A. Sari, M. H. Dzaki, E. H. Rachmawanto, R. R. Ali, and M. Doheir, “High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 568–580, 2023. https://doi.org/10.22266/ijies2023.0831.46

S. T. Ahmed, D. A. Hammood, R. F. Chisab, A. Al-Naji, and J. Chahl, “Medical Image Encryption: A Comprehensive Review,” Computers, vol. 12, no. 8. Multidisciplinary Digital Publishing Institute (MDPI), Aug. 01, 2023. https://doi.org/10.3390/computers12080160

M. Abu-Faraj et al., “Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps,” Cryptography, vol. 7, no. 2, 2023. https://doi.org/10.3390/cryptography7020020

S. T. Kamal, K. M. Hosny, T. M. Elgindy, M. M. Darwish, and M. M. Fouda, “A new image encryption algorithm for grey and color medical images,” IEEE Access, vol. 9, pp. 37855–37865, 2021. https://doi.org/10.1109/ACCESS.2021.3063237

I. Prayogo Pujiono, E. Hari Rachmawanto, U. K. Abdurrahman Wahid, U. Dian Nuswantoro, and D. Anggriawan Nugroho, “The Implementation of Improved Advanced Encryption Standard and Least Significant Bit for Securing Messages in Images,” 2023.

V. Kakkad, M. Patel, and M. Shah, “Biometric authentication and image encryption for image security in cloud framework,” Multiscale and Multidisciplinary Modeling, Experiments and Design, vol. 2, no. 4, pp. 233–248, Dec. 2019. https://doi.org/10.1007/s41939-019-00049-y

M. Gupta, V. P. Singh, K. K. Gupta, and P. K. Shukla, “An efficient image encryption technique based on two-level security for internet of things,” Multimed Tools Appl, vol. 82, no. 4, pp. 5091–5111, Feb. 2023. https://doi.org/10.1007/s11042-022-12169-8

E. J. G, H. M. A, and F. H. M. S, “Enhanced Security: Implementation of Hybrid Image Steganography Technique using Low-Contrast LSB and AES-CBC Cryptography,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, p. 2022, 2022. https://dx.doi.org/10.14569/IJACSA.2022.01308104

M. S. Abdalzaher, M. M. Fouda, and M. I. Ibrahem, “Data Privacy Preservation and Security in Smart Metering Systems,” Energies, vol. 15, no. 19. MDPI, Oct. 01, 2022. https://doi.org/10.3390/en15197419

P. N. Lone, D. Singh, V. Stoffová, D. C. Mishra, U. H. Mir, and N. Kumar, “Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher,” Mathematics, vol. 10, no. 20, Oct. 2022. https://doi.org/10.3390/math10203878

M. Derese Gietaneh and T. Birara Akele, “Enhancing the Hill Cipher Algorithm and Employing a One Time Pad Key Generation Technique,” Abyssinia Journal of Engineering and Computing Abyss. J. Engg & Comput, vol. 3, no. 1, pp. 1–10, 2023.

H. N. Khalid, A. Hafizah, and M. Aman, “Digital Image Steganography in Spatial Domain: A Critical Study,” 2020.

S. Gupta, K. Saluja, V. Solanki, K. Kaur, P. Singla, and M. Shahid, “Efficient methods for digital image watermarking and information embedding,” Measurement: Sensors, vol. 24, p. 100520, Dec. 2022. https://doi.org/10.1016/j.measen.2022.100521

M. Fadlan, Haryansyah, and Rosmini, “Three Layer Encryption Protocol: an Approach of Super Encryption Algorithm,” in 2021 3rd International Conference on Cybernetics and Intelligent System (ICORIS), IEEE, Oct. 2021, pp. 1–5. https://doi.org/10.1109/ICORIS52787.2021.9649574

M. A. Budiman, Amalia, and N. I. Chayanie, “An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security,” in Journal of Physics: Conference Series, Institute of Physics Publishing, Mar. 2018. https://doi.org/10.1088/1742-6596/978/1/012086

C. Umam, L. B. Handoko, C. A. Sari, E. H. Rachmawanto, and L. A. R. Hakim, “Kombinasi Vigenere dan Autokey Cipher dalam Proses Proteksi SMS Berbasis Android,” Prosiding Sains Nasional dan Teknologi, vol. 12, no. 1, p. 492, Nov. 2022. http://dx.doi.org/10.36499/psnst.v12i1.7108

U. Sara, M. Akter, and M. S. Uddin, “Image Quality Assessment through FSIM, SSIM, MSE and PSNR—A Comparative Study,” Journal of Computer and Communications, vol. 07, no. 03, pp. 8–18, 2019. https://doi.org/10.4236/jcc.2019.73002

D. E. Mfungo and X. Fu, “Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps,” Entropy, vol. 25, no. 11, p. 1478, Oct. 2023. https://doi.org/10.3390/e25111478

B. Zolfaghari and T. Koshiba, “Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap,” Applied System Innovation, vol. 5, no. 3. MDPI, Jun. 01, 2022. https://doi.org/10.3390/asi5030057

M. Kaur, S. Singh, and M. Kaur, “Computational Image Encryption Techniques: A Comprehensive Review,” Mathematical Problems in Engineering, vol. 2021. Hindawi Limited, 2021. https://doi.org/10.1155/2021/5012496

J. Gao, Y. Wang, Z. Song, and S. Wang, “Quantum Image Encryption Based on Quantum DNA Codec and Pixel-Level Scrambling,” Entropy, vol. 25, no. 6, Jun. 2023. https://doi.org/10.3390/e25060865

A. Susanto et al., “Triple layer image security using bit-shift, chaos, and stream encryption,” Bulletin of Electrical Engineering and Informatics, vol. 9, no. 3, pp. 980–987, Jun. 2020. https://doi.org/10.11591/eei.v9i3.2001

A. Arab, M. J. Rostami, and B. Ghavami, “An image encryption method based on chaos system and AES algorithm,” Journal of Supercomputing, vol. 75, no. 10, pp. 6663–6682, Oct. 2019. https://doi.org/10.1007/s11227-019-02878-7

Author biographies is not available.
Download this PDF file
PDF
Statistic
Read Counter : 1 Download : 0

Downloads

Download data is not yet available.

Quick Link

  • Author Guidelines
  • Download Manuscript Template
  • Peer Review Process
  • Editorial Board
  • Reviewer Acknowledgement
  • Aim and Scope
  • Publication Ethics
  • Licensing Term
  • Copyright Notice
  • Open Access Policy
  • Important Dates
  • Author Fees
  • Indexing and Abstracting
  • Archiving Policy
  • Scopus Citation Analysis
  • Statistic
  • Article Withdrawal

Meet Our Editorial Team

Ir. Amrul Faruq, M.Eng., Ph.D
Editor in Chief
Universitas Muhammadiyah Malang
Google Scholar Scopus
Agus Eko Minarno
Editorial Board
Universitas Muhammadiyah Malang
Google Scholar  Scopus
Hanung Adi Nugroho
Editorial Board
Universitas Gadjah Mada
Google Scholar Scopus
Roman Voliansky
Editorial Board
Dniprovsky State Technical University, Ukraine
Google Scholar Scopus
Read More
 

KINETIK: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
eISSN : 2503-2267
pISSN : 2503-2259


Address

Program Studi Elektro dan Informatika

Fakultas Teknik, Universitas Muhammadiyah Malang

Jl. Raya Tlogomas 246 Malang

Phone 0341-464318 EXT 247

Contact Info

Principal Contact

Amrul Faruq
Phone: +62 812-9398-6539
Email: faruq@umm.ac.id

Support Contact

Fauzi Dwi Setiawan Sumadi
Phone: +62 815-1145-6946
Email: fauzisumadi@umm.ac.id

© 2020 KINETIK, All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License