Pengamanan Pada Citra Digital dengan Menggunakan Modifikasi Blok Data Algoritma AES - Rijndael

Authors

  • Muhammad Haris Uniersitas Sumatera Utara, Medan
  • Maya Silvi Lydia Uniersitas Sumatera Utara, Medan
  • Sutarman Sutarman Uniersitas Sumatera Utara, Medan

DOI:

https://doi.org/10.30865/mib.v7i1.5458

Keywords:

Modification, Rijndael, Input, Image, Encryption

Abstract

Digital Image Security is one of the most important information security topics today. Along with the increasing use of digital images both for communication and documentation purposes, the security of information contained in digital images needs serious attention. Rijndael is a cryptographic method that is not only used for text encryption but also for digital image encryption. Just like block-based cryptographic methods in general, encoding data bytes only has an effect on the internal environment of the block, because the transformation process in Rijndael is done separately for each input block. In digital images, this can result in visible patterns or shapes of objects contained in the image, especially when using the Rijndael standard block size of 4x4. To improve the quality of digital image encryption on Rijndael, several studies have made modifications, especially at the transformation stage. In terms of data, the statistical values obtained from the encryption results such as the correlation coefficient do show an increase, but visually the pattern of objects is still visible and modifications tend to be high. This research proposes a modification of Rijndael which focuses on increasing the input block size from 4x4 to 8x8 with minimal changes to the transformation function. The results showed that the value of the correlation coefficient was better and the results of the encryption visually disguised the shape of the object more than the usual Rijndael, especially in text images, logos and caricatures. From the process carried out there is an increase in the quality of security for the encryption process by 13.22% to 91.48%.

References

A. Arab, M. J. Rostami dan B. Ghavami, “An image encryption method based on chaos system and AES algorithm,†The Journal of Supercomputing, vol. 75, no. 10, pp. 6663-6682, 2019.

N. Nguyen-Thanh, D. Marinca, K. Khawam, S. Martin dan L. Boukhatem, “Multimedia content popularity: Learning and recommending a prediction method,†dalam 2018 IEEE Global Communications Conference (GLOBECOM), 2018.

J. Daemen dan V. Rijmen, AES proposal: Rijndael, 1999.

N. Rachmat dan Samsuryadi, “Performance Analysis of 256-bit AES Encryption Algorithm on Android Smartphone,†Journal of Physics: Conference Series, vol. 1196, p. 012049, 2019.

S. Zaineldeen dan A. Ate, “Review of cryptography in cloud computing,†Int. J. Comput. Sci. Mobile Comput., vol. 9, no. 3, pp. 211-220, 2020.

R. J. Rasras, M. Abuzalata, Z. Alqadi, J. Al-Azzeh dan Q. Jaber, “Comparative Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation,†International Journal of Computer Science and Mobile Computing, vol. 8, no. 3, pp. 14-26, 2019.

M. Zeghid, M. Machhout, L. Khriji, A. Baganne dan R. Tourki, “A modified AES based algorithm for image encryption,†International Journal of Computer Science and Engineering, vol. 1, no. 1, pp. 70-75, 2007.

O. F. Mohammad, M. S. M. Rahim, S. R. M. Zeebaree dan F. Y. Ahmed, “A survey and analysis of the image encryption methods,†International Journal of Applied Engineering Research, vol. 12, no. 23, pp. 13265-13280, 2017.

H. V. Gamido, A. M. Sison dan R. P. Medina, “Implementation of modified AES as image encryption scheme,†Indonesian Journal of Electrical Engineering and Informatics (IJEEI), vol. 6, no. 3, pp. 301-308, 2018.

P. Sharma dan H. Sabharwal, “A New Image Encryption using Modified AES Algorithm and its Comparision with AES,†International Journal Of Engineering Research & Technology (IJERT), vol. 9, no. 8, pp. 194-197, 2020.

I. N. Ibraheem, S. M. Hassan dan A. Abead, “Comparative Analysis & Implementation of Image Encryption & Decryption for Mobile Cloud Security,†International Journal of Advanced Science and Technology, vol. 29, no. 3s, pp. 109-121, 2020.

A. Alabaichi, “True Color Image Encryption Based On Dna Sequence, 3d Chaotic Map, And Key-Dependent Dna S-Box Of Aes,†Journal of Theoretical & Applied Information Technology, vol. 96, no. 2, pp. 304-321, 2018.

R. Hongal, H. Jyoti dan S. Rajashekar, “An Approach towards Design of N-Bit AES to Enhance Security using Reversible Logic,†Communications on Applied Electronics, vol. 7, no. 22, pp. 7-13, 2018.

R. Debnath, P. Agrawal dan G. Vaishnav, “DES, AES And Triple DES: Symmetric Key Cryptography Algorithm,†International Journal of Science, Engineering and Technology Research, vol. 3, no. 3, p. 652–654, 2014.

H. Alanazi, B. B. Zaidan, A. A. Zaidan, H. A. Jalab, M. Shabbir dan Y. Al-Nabhani, “New comparative study between DES, 3DES and AES within nine factors,†arXiv preprint arXiv:1003.4085.

S. S. Gaur, H. S. Kalsi dan S. Gautam, “A Comparative Study and Analysis of Cryptographic Algorithms: RSA, DES, AES, BLOWFISH, 3-DES, and TWOFISH,†International Journal Of Research In Electronics And Computer Engineering (IJRECE), vol. 7, no. 1, pp. 996-999, 2019.

Y. Pourasad, R. Ranjbarzadeh dan A. Mardani, “A New Algorithm for Digital Image Encryption Based on Chaos Theory,†Entropy, vol. 23, no. 3, p. 341, 2021.

S. T. Kamal, K. M. Hosny, T. M. Elgindy, M. M. Darwish dan M. M. Fouda, “A new image encryption algorithm for grey and color medical images,†IEEE Access, vol. 9, pp. 37855-37865, 2021.

J. Hao, H. Li, H. Yan dan J. Mou, “A New Fractional Chaotic System and Its Application in Image Encryption With DNA Mutation,†IEEE Access, vol. 9, pp. 52364-52377, 2021.

P. Roy, S. Bhattacharya, S. Ghosh dan U. Pal, “Effects of Degradations on Deep Neural Network Architectures,†arXiv preprint arXiv:1807.10108, 3 12 2018.

Arpanio, “OCR - Handwriting Recognition,†kaggle, 2020.

V. Subbiah, “Pokemon Image Dataset,†kaggle, 2019

Zebua, T & Ndruru, E. (2017). Pengamana Citra Digital Berdasarkan Modifikasi Algoritma RC4. Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK). Vol. 4, No. 4, Desember 2017, hlm. 275-282

Downloads

Published

2023-01-31