Rancang Bangun Aplikasi Enkripsi Citra Berdasarkan Operasi Rotasi
Main Article Content
Abstract
Cryptography is a discipline that uses mathematical equations when doing the decryption process until encryption. This technique uses to convert the initial message into the form of certain codes, in this study using the rotation method, the rotation method itself is the algorithm to rotate the image on its axis in part of the image. Aiming that information stored and sent to the recipient can’t be read or not easily understood by a third party or parties that are not eligible, advantages of the research made is the speed of fast application process and the decline in file size and not easy manual decryption With other tools, the result of encryption application encoding the occurrence of file size that occurs after the decryption process and encryption when compared with the initial size of the image file, and there is no decrease in the size of the file on BMP extension, the speed of encryption time to the file and the pixel size in the image file extension BMP And PNG on 2000x2000 pixel size has the best speed improvement that is equal to 0.12x faster, and change the histogram in the initial image with the result of encryption. This research is built using Python 3.4 programming language, and coupled with Library PIL-pillow, Library Time.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
Rizqi Firmansyah and W. Suadi, “Pada Media Gambar Dengan Menggunakan Metode Des Dan Region-Embed Data Density .,” Byte, pp. 1–7, 2011.
B. S. W. Poetro, P. Studi, T. Informatika, and U. Diponegoro, “Prosiding seminar nasional ilmu komputer universitas diponegoro 2010 semarang, 7 agustus 2010,” pp. 175–178, 2010.
D. Abrihama, “Keystream Vigenere Cipher: Modifikasi Vigenere Cipher dengan Pendekatan Keystream Generator,” Progr. Stud. Inform. ITB. Bandung, 2008.
Z. Liu, S. Li, M. Yang, W. Liu, and S. Liu, “Image encryption based on the random rotation operation in the fractional Fourier transform domains,” Opt. Lasers Eng., vol. 50, no. 10, pp. 1352–1358, 2012.
B. Santoso, “Bahasa Pemrograman Python di Platform GNU/LINUX,” pp. 1–9, 2016.
T. Heriyanto, “Pengenalan Kriptografi,” p. 60, 1999.
D. Putra, Pengolahan Citra Digital, 1st ed. Yogyakarta: ANDI OFFSET, 2010.
R. Munir, “Digital Menggunakan Kombinasi Dua Chaos Map Dan Penerapan Teknik Selektif.”
P. Ronsen, A. Halim, and I. Syahputra, “Enkripsi Citra Digital Menggunakan Arnold’s Cat Map dan Nonlinear Chaotic Algorithm,” JSM STMIK Mikroskil, vol. 15, no. 2, pp. 61–71, 2014.
V. Yuniati, G. Indriyanta, and A. R. C, “Enkripsi dan Dekripsi dengan Algoritma AES 256 untuk Semua Jensis File,” J. Inform., vol. 5, no. 1, pp. 22–31, 2009.
DOI: https://doi.org/10.22219/repositor.v1i1.2
Tweet