The Aplikasi Model Text Area Based Image Selective Encryption Menggunakan YoloV3, Arnold's Catmap dan AES Pada Pengamanan Konten Teks Pada Citra Digital
DOI:
https://doi.org/10.30865/jurikom.v12i5.9261Keywords:
Enkripsi Selektif, YoloV3, Arnold's Cat Map, AES, Deteksi Teks, Keamanan Citra DigitalAbstract
sensitive content in digital images. This research proposes a selective encryption model based on text area detection in digital images, integrating object detection using You Only Look Once version 3 (YOLOv3), Arnold's Cat Map transformation, and the Advanced Encryption Standard (AES) algorithm. The model automatically identifies and selects areas containing text in the image using YOLOv3, applies Arnold's Cat Map for spatial disorganization, and then encrypts the transformed result with AES to ensure data security. System performance is evaluated through visual quality analysis using PSNR (Peak Signal-to-Noise Ratio) and SSIM (Structural Similarity Index) parameters, as well as encryption and decryption processing time. The test results show that this approach can maintain the integrity of non-text areas while providing strong protection for sensitive text areas without compromising efficiency or overall visual quality. This model has the potential to be applied in the context of securing digital documents, visual identities, and other sensitive data in images.
References
[1] A. Singh, P. Agarwal and M. Chand, "Image encryption and analysis using dynamic AES," in 2019 5th International Conference on Optimization and Applications (ICOA), 2019.
[2] P. Sharma and H. Sabharwal, "A New Image Encryption using Modified AES Algorithm and its Comparision with AES," International Journal of Engineering Research Technology (IJERT), vol. 9, no. 8, pp. 194-197, 2020.
[3] F. H. M. S. Al-Kadei, H. A. Mardan and N. A. Minas, "Speed up image encryption by using RSA algorithm," in 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), 2020.
[4] A. Jain and S. Sharma, "A Novel Digital Image Encryption Method Based on RSA Algorithm," International Journal of Electronics Engineering, vol. 11, no. 1, pp. 650-654, 2019.
[5] J. Srivatsava and R. Sheeja, "Implementation of triple DES algorithm in data hiding and image encryption techniques," International Journal of Advanced Science and Technology, vol. 29, no. 3, pp. 10549-10559, 2020.
[6] R. Muhammad, J. Raharjo and N. Andini, "Implementasi Data Encryption Standard (des) Pada Image Watermarking Citra Menggunakan Algoritma Discrete Cosine Transform (dct)," eProceedings of Engineering, vol. 6, no. 2, pp. 4032-4037, 2019.
[7] Z. Nie, Z. X. Liu, X. T. He and L. H. Gong, "Image compression and encryption algorithm based on advanced encryption standard and hyper-chaotic system," Optica Applicata, vol. 49, no. 4, pp. 545-558, 2019.
[8] G. K. Soni, A. Rawat, S. Jain and S. K. Sharma, "A pixel-based digital medical images protection using genetic algorithm with LSB watermark technique," in In Smart Systems and IoT: Innovations in Computing: Proceeding of SSIC 2019, 2020.
[9] T. H. Chen and C. H. Yang, "Region of Interest Encryption Based on Novel 2D Hyperchaotic Signal and Bagua Coding Algorithm," IEEE Access, vol. 10, pp. 82751- 82765, 2022.
[10] O. A. Khashan and M. AlShaikh, "Edge-based lightweight selective encryption scheme for digital medical images," Multimedia Tools and Applications, vol. 79, no. 35-36, pp. 26369-26388, 2020.
[11] Y. Xu, M. Li, L. Cui, S. Huang, F. Wei and M. Zhou, "Layoutlm: Pre-training of text and layout for document image understanding," in In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2020.
[12] L. Cao, H. Li, R. Xie and J. Zhu, "A text detection algorithm for image of student exercises based on CTPN and enhanced YOLOv3," IEEE Access, vol. 8, pp. 176924- 176934, 2020.
[13] L. Xiao, P. Zhou, K. Xu and X. Zhao, "Multi-directional scene text detection based on improved YOLOv3," Sensors, vol. 21, no. 14, p. 4870, 2021.
[14] O. A. Khashan and N. M. Khafajah, "Secure stored images using transparent crypto filter driver," International Journal of Network Security, vol. 20, no. 6, p. 1053–1060, 2018.
[15] S. Heidari, M. Naseri and K. Nagata, "Quantum selective encryption for medical images," International Journal of Theoretical Physics, vol. 58, pp. 3908-3926, 2019.
[16] N. A. Khan, M. Altaf and F. A. Khan, "Selective encryption of JPEG images with chaotic based novel S-box," Multimedia Tools and Applications, vol. 80, pp. 9639-9656, 2021.
[17] M. Farajallah, G. Gautier, W. Hamidouche, O. Déforges and S. El Assad, "Selective Encryption of the Versatile Video Coding Standard," IEEE Access, vol. 10, pp. 21821- 21835, 2022.
[18] R. I. Abdelfatah, "Audio encryption scheme using self-adaptive bit scrambling and two multi chaotic-based dynamic DNA computations," IEEE Access, vol. 8, pp. 69894- 69907, 2020.
[19] A. Farhadi and J. Redmon, "Yolov3: An incremental improvement," in In Computer vision and pattern recognition, Berlin/Heidelberg, Germany, 2018.]



