Pengamanan Citra Dengan Operator Algoritma Genetika

Authors

  • Abduh Riski Universitas Jember
  • Ahmad Saiful Rizal Universitas Jember
  • Ahmad Kamsyakawuni Universitas Jember

DOI:

https://doi.org/10.21111/fij.v4i1.2906

Keywords:

crossover, mutation, encryption, decryption, histogram, differential, correlation

Abstract

AbstrakPerkembangan teknologi komputer yang semakin pesat tentu diperlukan teknik pengamanan data baik data teks maupun data citra. Pengamanan data menjadi hal yang sangat penting agar data yang dikirimkan tetap terjaga kerahasiaannya. Pada penelitian ini akan dibahas tentang Operator Algoritma Genetika dalam mengamankan data citra. Operator tersebut adalah crossover dan mutasi. Kunci yang digunakan berupa citra yang akan mengalami pergeseran bit. Proses enkripsi dengan Operator Algoritma Genetika menghasilkan citra yang terlihat acak dan  susah untuk ditebak gambar aslinya. Proses dekripsi dengan Operator Algoritma Genetika dapat mengembalikan cipher image menjadi citra yang sebenarnya. Analisis keamanan dari metode yang digunakan menunjukkan bahwa algoritma aman dari serangan analisis frekuensi dibuktikan dengan analisis histogram, analisis diferensial dengan rata-rata NPCR 99,65% dan UACI 32,41%,  dan  analisis korelasi dengan rata-rata sebesar -0,01.Kata kunci: crossover, mutasi, enkripsi, dekripsi, histogram, diferensial, korelasi Abstract[Image Security with Operator of Genetic Algorithm] The rapid development of computer technology needed a technique to secure data both text and image. Data security is vital that the data is sent still safe its confidentiality. In this article will be proposed about security image by Operator of Genetic Algorithm. These operators are crossover and mutation. The key is an image that will get bitshift. Encryption process with operator Genetic Algorithm producing the image which looks random and confusing to predict the original image. Decryption process with Operator Genetic Algorithm can change cipher image to the real image. Security analysis of the method which used indicates that algorithm is secured from analysis frequency attack, proven by analysis histogram, averages analysis differential NPCR 99,65% and UACI 32,41%, and averages correlation value -0,01.Keywords: crossover, mutation, encryption, decryption, histogram, differential, correlation

References

Ara Komputer. [online] Ara komputer. Available at: https://www.arakomputer.com [Accessed 24 May 2020].

Hardjo, A. B. 2016. Enkripsi Citra RGB dengan Algoritma Simplified-Data Encryption Standard (S-DES) dan DNA-Vigenere Cipher. Skripsi. Jember: Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Jember.

Latif, S., J. Qayyum, M. Lal, dan F. Khan. 2011. Complete Description of Well-Known Number Systems using Single Table. International Journal of Electrical and Computer Sciences IJECS 11 (3):23-29.

Stallings, W. 2006. Cryptography and Network Security: Principles and Practices. New Jersey: Pearson Education Inc Standard (S-DES) dan DNA-Vigenere Cipher. Skripsi. Jember: Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Jember.

Dias, M., C. Suhery, dan T. Rismawan. 2016. Penerapan Kriptografi Menggunakan Algoritma Knapsack, Algoritma Genetika, dan Algoritma Arnold’s Catmap pada Citra. Jurnal Coding, Sistem Komputer Untan 4 (2): 119-129.

Behnia, S., A. Akhshani, S. Ahadpour, H. Mahmodi, dan A. Akhavan. 2007. A Fast Chaotic Encryption Scheme Based on Piecewise Nonlinear Chaotic Maps. Physics Letters A 366: 391-396

Boriga, R. E., A. C. Dăscălescu, dan A. V. Diaconu. 2014. A New Fast Image Encryption Scheme Based on 2D Chaotic Maps. IAENG International Journal of Computer Science 41 (4).

Mousa, A., O.S. Faragallah, S. El-Rabaie, dan E.M. Nigm. 2013. Security Analysis of Reverse Encryption Algorithm for Databases. International Journal of Computer Applications (0975-8887) 66 (14): 19-27.

Downloads

Submitted

2019-02-14

Accepted

2019-05-05

Published

2019-05-10

Issue

Section

Articles