Pengamanan Citra Dengan Operator Algoritma Genetika
DOI:
https://doi.org/10.21111/fij.v4i1.2906Keywords:
crossover, mutation, encryption, decryption, histogram, differential, correlationAbstract
AbstrakPerkembangan teknologi komputer yang semakin pesat tentu diperlukan teknik pengamanan data baik data teks maupun data citra. Pengamanan data menjadi hal yang sangat penting agar data yang dikirimkan tetap terjaga kerahasiaannya. Pada penelitian ini akan dibahas tentang Operator Algoritma Genetika dalam mengamankan data citra. Operator tersebut adalah crossover dan mutasi. Kunci yang digunakan berupa citra yang akan mengalami pergeseran bit. Proses enkripsi dengan Operator Algoritma Genetika menghasilkan citra yang terlihat acak dan susah untuk ditebak gambar aslinya. Proses dekripsi dengan Operator Algoritma Genetika dapat mengembalikan cipher image menjadi citra yang sebenarnya. Analisis keamanan dari metode yang digunakan menunjukkan bahwa algoritma aman dari serangan analisis frekuensi dibuktikan dengan analisis histogram, analisis diferensial dengan rata-rata NPCR 99,65% dan UACI 32,41%, dan analisis korelasi dengan rata-rata sebesar -0,01.Kata kunci: crossover, mutasi, enkripsi, dekripsi, histogram, diferensial, korelasi Abstract[Image Security with Operator of Genetic Algorithm] The rapid development of computer technology needed a technique to secure data both text and image. Data security is vital that the data is sent still safe its confidentiality. In this article will be proposed about security image by Operator of Genetic Algorithm. These operators are crossover and mutation. The key is an image that will get bitshift. Encryption process with operator Genetic Algorithm producing the image which looks random and confusing to predict the original image. Decryption process with Operator Genetic Algorithm can change cipher image to the real image. Security analysis of the method which used indicates that algorithm is secured from analysis frequency attack, proven by analysis histogram, averages analysis differential NPCR 99,65% and UACI 32,41%, and averages correlation value -0,01.Keywords: crossover, mutation, encryption, decryption, histogram, differential, correlationReferences
Ara Komputer. [online] Ara komputer. Available at: https://www.arakomputer.com [Accessed 24 May 2020].
Hardjo, A. B. 2016. Enkripsi Citra RGB dengan Algoritma Simplified-Data Encryption Standard (S-DES) dan DNA-Vigenere Cipher. Skripsi. Jember: Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Jember.
Latif, S., J. Qayyum, M. Lal, dan F. Khan. 2011. Complete Description of Well-Known Number Systems using Single Table. International Journal of Electrical and Computer Sciences IJECS 11 (3):23-29.
Stallings, W. 2006. Cryptography and Network Security: Principles and Practices. New Jersey: Pearson Education Inc Standard (S-DES) dan DNA-Vigenere Cipher. Skripsi. Jember: Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Jember.
Dias, M., C. Suhery, dan T. Rismawan. 2016. Penerapan Kriptografi Menggunakan Algoritma Knapsack, Algoritma Genetika, dan Algoritma Arnold’s Catmap pada Citra. Jurnal Coding, Sistem Komputer Untan 4 (2): 119-129.
Behnia, S., A. Akhshani, S. Ahadpour, H. Mahmodi, dan A. Akhavan. 2007. A Fast Chaotic Encryption Scheme Based on Piecewise Nonlinear Chaotic Maps. Physics Letters A 366: 391-396
Boriga, R. E., A. C. Dăscălescu, dan A. V. Diaconu. 2014. A New Fast Image Encryption Scheme Based on 2D Chaotic Maps. IAENG International Journal of Computer Science 41 (4).
Mousa, A., O.S. Faragallah, S. El-Rabaie, dan E.M. Nigm. 2013. Security Analysis of Reverse Encryption Algorithm for Databases. International Journal of Computer Applications (0975-8887) 66 (14): 19-27.
Downloads
Submitted
Accepted
Published
Issue
Section
License
Please find the rights and licenses in the Fountain of Informatics Journal (FIJ). By submitting the article/manuscript of the article, the author(s) agree with this policy. No specific document sign-off is required.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Author(s)' Warranties
The author warrants that the article is original, written by the stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author, and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).
3. User/Public Rights
FIJ's spirit is to disseminate articles published are as free as possible. Under the Creative Commons license, FIJ permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and FIJ on distributing works in the journal and other media of publications. Unless otherwise stated, the authors are public entities as soon as their articles got published.
4. Rights of Authors
Authors retain all their rights to the published works, such as (but not limited to) the following rights;
- Copyright and other proprietary rights relating to the article, such as patent rights,
- The right to use the substance of the article in own future works, including lectures and books,
- The right to reproduce the article for own purposes,
- The right to self-archive the article (please read out deposit policy),
- The right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Jurnal Optimasi Sistem Industri).
5. Co-Authorship
If the article was jointly prepared by more than one author, any authors submitting the manuscript warrants that he/she has been authorized by all co-authors to be agreed on this copyright and license notice (agreement) on their behalf, and agrees to inform his/her co-authors of the terms of this policy. FIJ will not be held liable for anything that may arise due to the author(s) internal dispute. FIJ will only communicate with the corresponding author.
6. Royalties
Being an open accessed journal and disseminating articles for free under the Creative Commons license term mentioned, author(s) aware that FIJ entitles the author(s) to no royalties or other fees.
7. Miscellaneous
FIJ will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed. FIJ's editors may modify the article to a style of punctuation, spelling, capitalization, referencing, and usage that deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers as mentioned in point 3.