Quick jump to page content
  • Main Navigation
  • Main Content
  • Sidebar

  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  • Register
  • Login
  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  1. Home
  2. Archives
  3. Vol. 10, No. 1, February 2025
  4. Articles

Issue

Vol. 10, No. 1, February 2025

Issue Published : Feb 1, 2025
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

A Hybrid Encryption using Advanced Encryption Standard and Arnold Scrambling for 3D Color Images

https://doi.org/10.22219/kinetik.v10i1.2058
Wellia Shinta Sari
University of Dian Nuswantoro
Erna Zuni Astuti
University of Dian Nuswantoro
Cahaya Jatmoko
University of Dian Nuswantoro

Corresponding Author(s) : Erna Zuni Astuti

erna.zuni.astuti@dsn.dinus.ac.id

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, Vol. 10, No. 1, February 2025
Article Published : Feb 1, 2025

Share
WA Share on Facebook Share on Twitter Pinterest Email Telegram
  • Abstract
  • Cite
  • References
  • Authors Details

Abstract

Digital security ensuring the confidentiality and integrity of visual data remains a paramount challenge. The escalating sophistication of cyber threats necessitates robust encryption methods to safeguard sensitive information from unauthorized access and manipulation. Despite the development of various encryption techniques, inherent vulnerabilities exist within conventional methods that can be exploited by attackers. Therefore, this research aims to investigate the effectiveness of the combined approach of Arnold Scrambling and Advanced Encryption Standard (AES) in mitigating these vulnerabilities and providing a more secure solution. The primary goal of this research is to enhance the security of digital images by mitigating vulnerabilities associated with conventional encryption methods. Arnold Scrambling introduces chaotic mapping to disperse pixel values, while Advanced Encryption Standard (AES) provides robust cryptographic strength through its substitution-permutation network. By combining these methods in an ensemble fashion, the encryption process achieves heightened resilience against various cryptographic attacks. The proposed methodology was evaluated by using standard metrics including Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR), and entropy analysis. Results indicate consistent performance across multiple test images, namely: Lena, Mandrill, Cameraman, and Plane with Unified Average Changing Intensity (UACI) averaging 33.6% and Number of Pixels Change Rate (NPCR) nearing 99.8%. Entropy values approached maximum, affirming the efficacy of the encryption in generating highly randomized outputs.

Keywords

Advanced Encryption Standard Arnold Scrambling Encryption Entropy UACI NPCR
Sari, W. S., Astuti, E. Z., & Jatmoko, C. (2025). A Hybrid Encryption using Advanced Encryption Standard and Arnold Scrambling for 3D Color Images. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 10(1). https://doi.org/10.22219/kinetik.v10i1.2058
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver
Download Citation
Endnote/Zotero/Mendeley (RIS)
BibTeX
References
  1. F. Varghese and P. Sasikala, “A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography,” Apr. 01, 2023, Springer. https://doi.org/10.1007/s11277-023-10183-z
  2. A. Jan, S. A. Parah, M. Hussan, and B. A. Malik, “Double layer security using crypto-stego techniques: a comprehensive review,” Jan. 01, 2022, Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/s12553-021-00602-1
  3. M. S. Taha, M. S. Mohd Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, “Combination of Steganography and Cryptography: A short Survey,” in IOP Conference Series: Materials Science and Engineering, Institute of Physics Publishing, Jun. 2019. https://doi.org/10.1088/1757-899X/518/5/052003
  4. V. Sathananthavathi, K. Ganesh Kumar, and M. Sathish Kumar, “Secure visual communication with advanced cryptographic and ımage processing techniques,” Multimed Tools Appl, 2023. https://doi.org/10.1007/s11042-023-17224-6
  5. W. Alexan, N. Alexan, and M. Gabr, “Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs,” Fractal and Fractional, vol. 7, no. 4, Apr. 2023. https://doi.org/10.3390/fractalfract7040287
  6. W. S. Sari, E. H. Rachmawanto, D. R. I. M. Setiadi, and C. A. Sari, “A Good Performance OTP encryption image based on DCT-DWT steganography,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 15, no. 4, pp. 1987–1995, Dec. 2017. https://doi.org/10.12928/TELKOMNIKA.v15i4.5883
  7. C. A. Sari, M. H. Dzaki, E. H. Rachmawanto, R. R. Ali, and M. Doheir, “High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 568–580, 2023. https://doi.org/10.22266/ijies2023.0831.46
  8. D. R. I. M. Setiadi, E. H. Rachmawanto, and R. Zulfiningrum, “Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 9, pp. 6818–6828, Oct. 2022. https://doi.org/10.1016/j.jksuci.2022.04.002
  9. E. A. Sofyan, C. A. Sari, H. Rachmawanto, and R. D. Cahyo, “High-Quality Evaluation for Invisible Watermarking Based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD),” Advance Sustainable Science, Engineering and Technology (ASSET), vol. 6, no. 1, 2024. https://doi.org/10.26877/asset.v6i1.17186
  10. G. Ardiansyah, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm,” in 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), 2017, pp. 249–254. https://doi.org/10.1109/ICITISEE.2017.8285505
  11. M. Rohini, M. A. Srikanth, M. Prajwal, P. R. Kumar, M. Basavaraj, and M. U. Vinay, “Advanced Data Security Using Modulo Operator and LSB Method,” Journal of Scholastic Engineering Science and Management, vol. 2023, no. 5, pp. 26–37, 2023. https://doi.org/10.5281/zenodo.7890771ï
  12. A. Mozo, A. Karamchandani, L. de la Cal, S. Gómez-Canaval, A. Pastor, and L. Gifre, “A Machine-Learning-Based Cyberattack Detector for a Cloud-Based SDN Controller,” Applied Sciences (Switzerland), vol. 13, no. 8, Apr. 2023. https://doi.org/10.3390/app13084914
  13. E. J. G, H. M. A, and F. H. M. S, “Enhanced Security: Implementation of Hybrid Image Steganography Technique using Low-Contrast LSB and AES-CBC Cryptography,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, p. 2022, 2022. https://doi.org/10.14569/IJACSA.2022.01308104
  14. J. Shankar and C. Nandini, “Hybrid Hyper Chaotic Map with LSB for Image Encryption and Decryption,” Scalable Computing: Practice and Experience, vol. 23, no. 4, pp. 181–192, Dec. 2022. https://doi.org/10.12694/scpe.v23i4.2018
  15. H. Liu, B. Zhao, and L. Huang, “Quantum image encryption scheme using Arnold transform and S-box scrambling,” Entropy, vol. 21, no. 4, Apr. 2019. https://doi.org/10.3390/e21040343
  16. P. Bagane and S. Kotrappa, “Enriching aes through the key generation from genetic algorithm,” Indian Journal of Computer Science and Engineering, vol. 12, no. 4, pp. 955–963, Jul. 2021. https://doi.org/10.21817/indjcse/2021/v12i4/211204141
  17. S. Srisakthi and A. P. Shanthi, “Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR),” Wirel Pers Commun, vol. 114, no. 4, pp. 3003–3015, Oct. 2020. https://doi.org/10.1007/s11277-020-07514-9
  18. W. Alexan, A. Hamza, and H. Medhat, “An AES Double–Layer Based Message Security Scheme,” in 2019 International Conference on Innovative Trends in Computer Engineering (ITCE), IEEE, Feb. 2019, pp. 86–91. https://doi.org/10.1109/ITCE.2019.8646461
  19. K. N. Madhusudhan and P. Sakthivel, “A secure medical image transmission algorithm based on binary bits and Arnold map,” May 01, 2021, Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/s12652-020-02028-5
  20. F. Masood et al., “A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map,” Multimed Tools Appl, vol. 81, no. 21, pp. 30931–30959, Sep. 2022. https://doi.org/10.1007/s11042-022-12844-w
  21. D. E. Supriyo, N. Bhanja, S. K. Dhara, S. Paul, and S. Das, “Color image encryption scheme based on key dependent s-box and arnold’s cat map,” International Journal of Engineering Research and Technology (IJERT), 2021.
  22. D. Vamsi and R. Ch, “Color Image Encryption Based on Arnold Cat Map-Elliptic Curve Key and A Hill Cipher,” J Theor Appl Inf Technol, vol. 15, no. 9, 2024.
  23. S. Sabir and V. Guleria, “Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map,” Multimed Tools Appl, vol. 80, no. 18, pp. 27829–27853, Jul. 2021. https://doi.org/10.1007/s11042-021-11003-x
  24. H. Liu, B. Zhao, and L. Huang, “Quantum image encryption scheme using Arnold transform and S-box scrambling,” Entropy, vol. 21, no. 4, p. 343, 2019. https://doi.org/10.3390/e21040343
  25. K. M. Hosny, S. T. Kamal, and M. M. Darwish, “A color image encryption technique using block scrambling and chaos,” Multimed Tools Appl, vol. 81, no. 1, pp. 505–525, 2022. https://doi.org/10.1007/s11042-021-11384-z
  26. K. Kumar, S. Roy, U. Rawat, and S. Malhotra, “IEHC: An efficient image encryption technique using hybrid chaotic map,” Chaos Solitons Fractals, vol. 158, p. 111994, 2022. https://doi.org/10.1016/j.chaos.2022.111994
  27. H. Tora, E. Gokcay, M. Turan, and M. Buker, “A generalized Arnold’s Cat Map transformation for image scrambling,” Multimed Tools Appl, vol. 81, no. 22, pp. 31349–31362, 2022. https://doi.org/10.1007/s11042-022-11985-2
  28. M. N. Alenezi, H. Alabdulrazzaq, H. M. Alhatlani, and F. A. Alobaid, “On the performance of AES algorithm variants,” International Journal of Information and Computer Security, vol. 23, no. 3, pp. 322–337, 2024. https://doi.org/10.1504/IJICS.2024.138494
  29. V. Kolate and R. B. Joshi, “An information security using DNA cryptography along with AES algorithm,” Turkish Journal of Computer and Mathematics Education, vol. 12, no. 1S, pp. 183–192, 2021.
  30. R. H. Prayitno, S. A. Sudiro, S. Madenda, and S. Harmanto, “A modified MixColumn-InversMixColumn in AES algorithm suitable for hardware implementation using FPGA device,” Communications in Science and Technology, vol. 8, no. 2, pp. 198–207, 2023. https://doi.org/10.21924/cst.8.2.2023.1257
  31. M. Bedoui, H. Mestiri, B. Bouallegue, B. Hamdi, and M. Machhout, “An improvement of both security and reliability for AES implementations,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 10, pp. 9844–9851, 2022. https://doi.org/10.1016/j.jksuci.2021.12.012
  32. Y. Pourasad, R. Ranjbarzadeh, and A. Mardani, “A new algorithm for digital image encryption based on chaos theory,” Entropy, vol. 23, no. 3, p. 341, 2021. https://doi.org/10.3390/e23030341
  33. F. Naz, I. A. Shoukat, R. Ashraf, U. Iqbal, and A. Rauf, “An ASCII based effective and multi-operation image encryption method,” Multimed Tools Appl, vol. 79, pp. 22107–22129, 2020. https://doi.org/10.1007/s11042-020-08897-4
  34. N. Chaudhary, T. B. Shahi, and A. Neupane, “Secure image encryption using chaotic, hybrid chaotic and block cipher approach,” J Imaging, vol. 8, no. 6, p. 167, 2022. https://doi.org/10.3390/jimaging8060167
  35. M. Ahmad et al., “An image encryption algorithm based on new generalized fusion fractal structure,” Inf Sci (N Y), vol. 592, pp. 1–20, 2022. https://doi.org/10.1016/j.ins.2022.01.042
Read More

References


F. Varghese and P. Sasikala, “A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography,” Apr. 01, 2023, Springer. https://doi.org/10.1007/s11277-023-10183-z

A. Jan, S. A. Parah, M. Hussan, and B. A. Malik, “Double layer security using crypto-stego techniques: a comprehensive review,” Jan. 01, 2022, Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/s12553-021-00602-1

M. S. Taha, M. S. Mohd Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, “Combination of Steganography and Cryptography: A short Survey,” in IOP Conference Series: Materials Science and Engineering, Institute of Physics Publishing, Jun. 2019. https://doi.org/10.1088/1757-899X/518/5/052003

V. Sathananthavathi, K. Ganesh Kumar, and M. Sathish Kumar, “Secure visual communication with advanced cryptographic and ımage processing techniques,” Multimed Tools Appl, 2023. https://doi.org/10.1007/s11042-023-17224-6

W. Alexan, N. Alexan, and M. Gabr, “Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs,” Fractal and Fractional, vol. 7, no. 4, Apr. 2023. https://doi.org/10.3390/fractalfract7040287

W. S. Sari, E. H. Rachmawanto, D. R. I. M. Setiadi, and C. A. Sari, “A Good Performance OTP encryption image based on DCT-DWT steganography,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 15, no. 4, pp. 1987–1995, Dec. 2017. https://doi.org/10.12928/TELKOMNIKA.v15i4.5883

C. A. Sari, M. H. Dzaki, E. H. Rachmawanto, R. R. Ali, and M. Doheir, “High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 568–580, 2023. https://doi.org/10.22266/ijies2023.0831.46

D. R. I. M. Setiadi, E. H. Rachmawanto, and R. Zulfiningrum, “Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 9, pp. 6818–6828, Oct. 2022. https://doi.org/10.1016/j.jksuci.2022.04.002

E. A. Sofyan, C. A. Sari, H. Rachmawanto, and R. D. Cahyo, “High-Quality Evaluation for Invisible Watermarking Based on Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD),” Advance Sustainable Science, Engineering and Technology (ASSET), vol. 6, no. 1, 2024. https://doi.org/10.26877/asset.v6i1.17186

G. Ardiansyah, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm,” in 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), 2017, pp. 249–254. https://doi.org/10.1109/ICITISEE.2017.8285505

M. Rohini, M. A. Srikanth, M. Prajwal, P. R. Kumar, M. Basavaraj, and M. U. Vinay, “Advanced Data Security Using Modulo Operator and LSB Method,” Journal of Scholastic Engineering Science and Management, vol. 2023, no. 5, pp. 26–37, 2023. https://doi.org/10.5281/zenodo.7890771ï

A. Mozo, A. Karamchandani, L. de la Cal, S. Gómez-Canaval, A. Pastor, and L. Gifre, “A Machine-Learning-Based Cyberattack Detector for a Cloud-Based SDN Controller,” Applied Sciences (Switzerland), vol. 13, no. 8, Apr. 2023. https://doi.org/10.3390/app13084914

E. J. G, H. M. A, and F. H. M. S, “Enhanced Security: Implementation of Hybrid Image Steganography Technique using Low-Contrast LSB and AES-CBC Cryptography,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, p. 2022, 2022. https://doi.org/10.14569/IJACSA.2022.01308104

J. Shankar and C. Nandini, “Hybrid Hyper Chaotic Map with LSB for Image Encryption and Decryption,” Scalable Computing: Practice and Experience, vol. 23, no. 4, pp. 181–192, Dec. 2022. https://doi.org/10.12694/scpe.v23i4.2018

H. Liu, B. Zhao, and L. Huang, “Quantum image encryption scheme using Arnold transform and S-box scrambling,” Entropy, vol. 21, no. 4, Apr. 2019. https://doi.org/10.3390/e21040343

P. Bagane and S. Kotrappa, “Enriching aes through the key generation from genetic algorithm,” Indian Journal of Computer Science and Engineering, vol. 12, no. 4, pp. 955–963, Jul. 2021. https://doi.org/10.21817/indjcse/2021/v12i4/211204141

S. Srisakthi and A. P. Shanthi, “Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR),” Wirel Pers Commun, vol. 114, no. 4, pp. 3003–3015, Oct. 2020. https://doi.org/10.1007/s11277-020-07514-9

W. Alexan, A. Hamza, and H. Medhat, “An AES Double–Layer Based Message Security Scheme,” in 2019 International Conference on Innovative Trends in Computer Engineering (ITCE), IEEE, Feb. 2019, pp. 86–91. https://doi.org/10.1109/ITCE.2019.8646461

K. N. Madhusudhan and P. Sakthivel, “A secure medical image transmission algorithm based on binary bits and Arnold map,” May 01, 2021, Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/s12652-020-02028-5

F. Masood et al., “A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map,” Multimed Tools Appl, vol. 81, no. 21, pp. 30931–30959, Sep. 2022. https://doi.org/10.1007/s11042-022-12844-w

D. E. Supriyo, N. Bhanja, S. K. Dhara, S. Paul, and S. Das, “Color image encryption scheme based on key dependent s-box and arnold’s cat map,” International Journal of Engineering Research and Technology (IJERT), 2021.

D. Vamsi and R. Ch, “Color Image Encryption Based on Arnold Cat Map-Elliptic Curve Key and A Hill Cipher,” J Theor Appl Inf Technol, vol. 15, no. 9, 2024.

S. Sabir and V. Guleria, “Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map,” Multimed Tools Appl, vol. 80, no. 18, pp. 27829–27853, Jul. 2021. https://doi.org/10.1007/s11042-021-11003-x

H. Liu, B. Zhao, and L. Huang, “Quantum image encryption scheme using Arnold transform and S-box scrambling,” Entropy, vol. 21, no. 4, p. 343, 2019. https://doi.org/10.3390/e21040343

K. M. Hosny, S. T. Kamal, and M. M. Darwish, “A color image encryption technique using block scrambling and chaos,” Multimed Tools Appl, vol. 81, no. 1, pp. 505–525, 2022. https://doi.org/10.1007/s11042-021-11384-z

K. Kumar, S. Roy, U. Rawat, and S. Malhotra, “IEHC: An efficient image encryption technique using hybrid chaotic map,” Chaos Solitons Fractals, vol. 158, p. 111994, 2022. https://doi.org/10.1016/j.chaos.2022.111994

H. Tora, E. Gokcay, M. Turan, and M. Buker, “A generalized Arnold’s Cat Map transformation for image scrambling,” Multimed Tools Appl, vol. 81, no. 22, pp. 31349–31362, 2022. https://doi.org/10.1007/s11042-022-11985-2

M. N. Alenezi, H. Alabdulrazzaq, H. M. Alhatlani, and F. A. Alobaid, “On the performance of AES algorithm variants,” International Journal of Information and Computer Security, vol. 23, no. 3, pp. 322–337, 2024. https://doi.org/10.1504/IJICS.2024.138494

V. Kolate and R. B. Joshi, “An information security using DNA cryptography along with AES algorithm,” Turkish Journal of Computer and Mathematics Education, vol. 12, no. 1S, pp. 183–192, 2021.

R. H. Prayitno, S. A. Sudiro, S. Madenda, and S. Harmanto, “A modified MixColumn-InversMixColumn in AES algorithm suitable for hardware implementation using FPGA device,” Communications in Science and Technology, vol. 8, no. 2, pp. 198–207, 2023. https://doi.org/10.21924/cst.8.2.2023.1257

M. Bedoui, H. Mestiri, B. Bouallegue, B. Hamdi, and M. Machhout, “An improvement of both security and reliability for AES implementations,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 10, pp. 9844–9851, 2022. https://doi.org/10.1016/j.jksuci.2021.12.012

Y. Pourasad, R. Ranjbarzadeh, and A. Mardani, “A new algorithm for digital image encryption based on chaos theory,” Entropy, vol. 23, no. 3, p. 341, 2021. https://doi.org/10.3390/e23030341

F. Naz, I. A. Shoukat, R. Ashraf, U. Iqbal, and A. Rauf, “An ASCII based effective and multi-operation image encryption method,” Multimed Tools Appl, vol. 79, pp. 22107–22129, 2020. https://doi.org/10.1007/s11042-020-08897-4

N. Chaudhary, T. B. Shahi, and A. Neupane, “Secure image encryption using chaotic, hybrid chaotic and block cipher approach,” J Imaging, vol. 8, no. 6, p. 167, 2022. https://doi.org/10.3390/jimaging8060167

M. Ahmad et al., “An image encryption algorithm based on new generalized fusion fractal structure,” Inf Sci (N Y), vol. 592, pp. 1–20, 2022. https://doi.org/10.1016/j.ins.2022.01.042

Author Biography

Wellia Shinta Sari, University of Dian Nuswantoro

https://orcid.org/0000-0003-4497-9903

Scopus Author ID: 57200570965

Download this PDF file
PDF
Statistic
Read Counter : 0 Download : 0

Downloads

Download data is not yet available.

Quick Link

  • Author Guidelines
  • Download Manuscript Template
  • Peer Review Process
  • Editorial Board
  • Reviewer Acknowledgement
  • Aim and Scope
  • Publication Ethics
  • Licensing Term
  • Copyright Notice
  • Open Access Policy
  • Important Dates
  • Author Fees
  • Indexing and Abstracting
  • Archiving Policy
  • Scopus Citation Analysis
  • Statistic
  • Article Withdrawal

Meet Our Editorial Team

Ir. Amrul Faruq, M.Eng., Ph.D
Editor in Chief
Universitas Muhammadiyah Malang
Google Scholar Scopus
Agus Eko Minarno
Editorial Board
Universitas Muhammadiyah Malang
Google Scholar  Scopus
Hanung Adi Nugroho
Editorial Board
Universitas Gadjah Mada
Google Scholar Scopus
Roman Voliansky
Editorial Board
Dniprovsky State Technical University, Ukraine
Google Scholar Scopus
Read More
 

KINETIK: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
eISSN : 2503-2267
pISSN : 2503-2259


Address

Program Studi Elektro dan Informatika

Fakultas Teknik, Universitas Muhammadiyah Malang

Jl. Raya Tlogomas 246 Malang

Phone 0341-464318 EXT 247

Contact Info

Principal Contact

Amrul Faruq
Phone: +62 812-9398-6539
Email: faruq@umm.ac.id

Support Contact

Fauzi Dwi Setiawan Sumadi
Phone: +62 815-1145-6946
Email: fauzisumadi@umm.ac.id

© 2020 KINETIK, All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License