Image Security System Using Playfair Cipher and Modification of Electronic Code Book (ECB) Algorithm
Keywords:
Electronic Code Book (ECB), Image, Playfair CipherAbstract
The image as output from a data recording system can be optical in the form of a photograph. In the image there is a pixel value. Image elements (Pixels) are part of an image or the smallest element of a digital image that can be seen by the eye. Image pixels can be converted to 8 binary digits (bits). The first to fourth bits are called the Least Significant Bit (LSB) and the fifth to eighth bits are called the Most Significant Bit (MSB). The purpose of this research is to compare the security level of image encryption using the Playfair combined cipher method and electronic code book modification using 2 other methods, namely Playfair cipher and electronic code book modification. The data used in this study are grayscale and RGB images and keys that have been determined with several characters. The results obtained show that security using a combination of the Playfair cipher method and electronic code book modification is safer than image security using the other 2 methods, namely Playfair cipher and electronic code book modification based on visual calculations, differential analysis, and correlation coefficient analysis.
References
A. Hariati, K. Hardiyanti, and W. E. Putri, “Kombinasi Algoritma Playfair Cipher Dengan Metode Zig-zag Dalam Penyandian Teks,” Sinkron, vol. 2, no. 2, pp. 13–17, 2018, [Online]. Available: https://jurnal.polgan.ac.id/index.php/sinkron/index
G. M. Kamau, S. Kimani, and M. Waweru, “An enhanced Least Significant Bit Steganographic Method For Information Hiding,” vol. 2, no. 9, p. 174, 2012, [Online]. Available: https://pdfs.semanticscholar.org/0afe/c8248f74db4d0ec606a13b4e39b58ca9998f.pdf
K. A. Santoso, R. A. Sukmawati, and A. Pradjaningsih, “Image security development using 3D playfair cipher combination and bit shift,” AIP Conf. Proc., vol. 2391, no. March, 2022, doi: 10.1063/5.0079220.
M. Asti, A. Kamsyakawuni, and K. A. Santoso, “Pengamanan Image Dengan Modifikasi Algoritma Electronic Code Book (Ecb),” Maj. Ilm. Mat. dan Stat., vol. 18, no. 2, p. 91, 2018, doi: 10.19184/mims.v18i2.17252.
A. Y. Putra and I. Yuliani, “Perancangan Dan Pengujian Perangkat Lunak Kriptografi Gabungan Playfair Cipher Dan Electronic Code Book (ECB),” Enter, pp. 560–570, 2019, [Online]. Available: http://sisfotenika.stmikpontianak.ac.id/index.php/enter/article/view/932
R. E. Boriga, A. C. Dăscălescu, and A. V. Diaconu, “A new fast image encryption scheme based on 2D chaotic maps,” IAENG Int. J. Comput. Sci., vol. 41, no. 4, pp. 249–258, 2014.
A. Mousa, O. S. Faragallah, S. El-Rabaie, and E. M. Nigm, “Security Analysis of Reverse Encryption Algorithm for Databases,” Int. J. Comput. Appl., vol. 66, no. 14, pp. 975–8887, 2013.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Kiswara Agung Santoso, Syarif Hidayatulloh, Ahmad Kamsyakawuni
This work is licensed under a Creative Commons Attribution 4.0 International License.