Implementation Of Affine Cipher Combination And Merkle Hellman On The Process Digital Image Security
DOI:
https://doi.org/10.59934/jaiea.v2i3.204Keywords:
cryptography, image, affine cipher algorithm, merkle hellman algorithmAbstract
The use of image media information has several weaknesses, one of which is the ease with which it can be manipulated by irresponsible people. Efforts made in increasing the security of this image is cryptography, namely the science and art of maintaining the security and confidentiality of images. Cryptography is used so that the confidentiality of the image can be maintained, so that it is not known by others. In general, there are 2 (two) techniques for carrying out cryptographic processes, namely encryption and decryption. In this study, the encryption process was first carried out using the Affine Cipher algorithm and then continued with the Merkle Hellman algorithm, while the decryption was carried out first by Merkle Hellman and then decrypted again with the Affine Cipher. The results of this study indicate that applying the Affine Cipher and Merkle Hellman algorithms can secure images. At the end of this system is an image that is in the form of blur so that it is not known and not understood by others. That way people who are not entitled cannot understand from the image.
Downloads
References
H. Mukhtar, Cryptography for Data Security . Yogyakarta, 2018.
MS Soeb Arifin, "Modification Analysis of Classical Cryptographic Algorithms Using the Blum-Micali Generator Algorithm," vol. 6, pp. 136–147, 2022.
Yusfrizal, "DESIGN OF CRYPTOGRAPHIC APPLICATIONS ON TEXT USING THE REVERSE CHIPER METHOD," vol. 3, no. 2, pp. 29–37, 2019.
A. Rambe, "Modification of Affine Ciphers Methods in Classical Cryptography," Ready Star , no. m, pp. 256–261, 2019, [Online]. Available: https://ptki.ac.id/jurnal/index.php/readystar/article/view/64
M. Simanjuntak, T. Pasaribu, and S. Rahmadilla, “Implementation of the Merkle Hellman Algorithm for Database Security,” MEANS (Media Inf. Anal. and Sist. , vol. 4, no. 1, pp. 46–50 , 2019, doi: 10.54367/means.v4i1.327.
Y. Antika, "Implementation of the Affine Cipher and Tripple Des Algorithms in Securing Image Files," Maj. CORE SCIENCES , vol. 14, no. 2, pp. 200–206, 2019.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Artificial Intelligence and Engineering Applications (JAIEA)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.