IMPLEMENTASI ALGORITMA CHUA CHAOTIC NOISE PADA ENKRIPSI CITRA RGB
DOI:
https://doi.org/10.30865/komik.v1i1.501Abstract
Now this information technology users using computers as his media greatly increased .An effective security of a system was technology information is really needed to day-to-day activities , the issue of security and secrecy is one of the important aspect of a message , data , or information. One of them is image , image is one part of the department of multimedia of what is important. The image of presenting information visually and information presented by an image richer than served in a textual. One way to secure imagery is with the process of encryption , encryption is the process of turning plaintext into chipertext , one of the methods that could be used is an algorithm chua chaotic noise that is the algorithms that having a manner of working with each pixel count that were on the image of pictures and then do rotation pixels in vertical synchronization and horizontal based on the length of pixels of any result rotation pixel image so that encryption would come out the more random. Sensitivity his on the early can also cause to change a significant impact on his iteration. Sensitivity is very talk in cryptography that corresponded to the principle of diffusion. To the principle of this diffusion then transformation of one bit of an initial value of chaos can cause chipertext still not succeed in decryptionReferences
R.V. Imbar and E. Tirta, "Analisa, Perancangan dan Implementasi Sistem Informasi Penjualan Pelumas (Studi Kasus : Perusahaan PT. Pro Roll International)," Jurnal Informatika, vol. III, no. 1, pp.119-149, 2007 [2] Suarga, Algoritma dan Pemrograman, Yogyakarta: Andi Publisher, 2012
S. Kromodimoeljo, TEORI & APLIKASI KRIPTOGRAFI, Jakarta: SPK IT Consulting, 2010
A. O. Abdul-Majeed , "Chaotic Scheme for Image Encryption Based on Arnold Cat's Map," (IJCSIS) International Journal of Computer Science and Information Security, vol.XII, no. 3, pp.26-33, 2014
R. Munir, Pengolahan Citra Digital, Bandung: Informatika, 2004
K. Kusrini and A. Koniyo, "Perancangan Sistem," Karya Ilmiah Dosen STMIK AMIKOM,Yogyakarta, pp.1-5, 2007
Siti Maslihah, (2014), Optimasi Masalah Penugasan, Jurnal Teknik Informatika.
R. Rahim and A. Ikhwan, “Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher,†Int. J. Sci. Res. Sci. Technol., vol. 2, no. 6, pp. 71–78, 2016.
Haryanto, A. P. U. Siahaan, R. Rahim, and Mesran, “Internet Protocol Security as the Network Cryptography System,†Int. J. Sci. Res. Sci. Technol., vol. 3, no. 6, pp. 223–226, 2017.
R. Rahim and A. Ikhwan, “Study of Three Pass Protocol on Data Security,†Int. J. Sci. Res., vol. 5, no. 11, pp. 102–104, 2016.

