Digital Image Data Security Using MATLAB -Based AES-128 Algorithm

Authors

  • Mazayah Tsaqofah Universitas Islam Negeri Sumatera Utara
  • Juwita Sari Universitas Islam Negeri Sumatera Utara
  • Nurhidayati Universitas Islam Negeri Sumatera Utara
  • Adinda Tarisyah Hsb Universitas Islam Negeri Sumatera Utara
  • Rizky Abdillah Universitas Islam Negri Sumatera Utara
  • Mrs. Rusdi Universitas Islam Negri Sumatera Utara

DOI:

https://doi.org/10.59934/jaiea.v5i2.2089

Keywords:

AES-128, Digital Image, Encryption, Decryption, Matlab

Abstract

Digital images are widely used for storing and transmitting sensitive information , so that aspect data security is becoming very important. This research discuss digital image data security using the Advanced Encryption Standard (AES) algorithm with a long key 128 bit implemented in MATLAB environment. The method used is cryptography . symmetric , where the encryption and decryption processes use a key the same secret . The encryption process done to randomize the pixel value of the original image so that visual information cannot be recognized , while the decryption process aim return image encrypted to condition back to the beginning without data changes . System evaluation done through histogram analysis , process time measurement , and evaluation quality image using the Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) parameters. The test results show that The encrypted image has a random histogram pattern and does not resemble original image . In addition that , the decryption process produce MSE value of zero and PSNR value not finite , which indicates the absence of lost information . Thus , it can concluded that the MATLAB -based AES-128 algorithm is effective and reliable in improving the security of digital image data .

Downloads

Download data is not yet available.

References

D. Pramudia, A. Fitriansyah, and R. Ramliyana, “A Hybrid Application of EOF Steganography and AES-128 Encryption for PDF File Security on Android,” J. Ris. and Apl. Mhs. Inform. , vol. 2, no. 03, pp. 437–444, 2021, doi: 10.30998/jrami.v2i03.1144.

S. Wijaya, “Analysis of Late Payments in Industry,” vol. 11, no. 2, pp. 166–177, 2024.

R. Rahmawati and D. Rahardjo, “Data Security Application Using Discrete Cosine Transform Steganography Algorithm and AES 128 BIT Cryptography at SMK PGRI 15 Jakarta,” J. Tech. Inform. and Sist. Inf. , vol. 2, no. April, pp. 67–74, 2023.

DC Anggarini and C. Kurniawan, “DESIGN OF AES RIJNDAEL ALGORITHM APPLICATION FOR 128 BIT JPEG FILE DIGITAL IMAGE ENCRYPTION,” 2024.

Ismai, “Textbook of Basic Concepts of Website Programming with PHP,” vol. 7, pp. 51–61, 2024.

ADIBDI Journal, MTIMM Dr. Ir. Untung Rahardja, K. Zelina, and ADI PUBLISHER, ADI Interdisciplinary Digital Business Journal (ABDI Journal) First Edition Vol 1. No 1. June 2020. ADI Publisher, 2021.

R. Rahman et al. , Computer Network Security Textbook . Jambi: PT. Sonpedia Publishing Indonesia, 2024.

Galih Yuga Pangestu, Asep Id Hadiana, and Puspita Nurul Sabrina, “Cryptography for Double Encryption of Images Using AES (Advanced Encryption Standard) and RC5 (Rivest Code 5) Algorithms,” Informatics Digit. Expert , vol. 4, no. 1, pp. 25–32, 2022.

F. Nuraeni, S. Tinggi, T. Garut, and D. Kurniadi, “Implementation of QR-Code and Digital Signature Schemes using a Combination of RSA and AES Algorithms for Electronic Certificate Data Security Academic Information System View project Educational Data Mining View project,” pp. 43–52, 2020.

A. Sapaatullah and M. Darip, “Web-Based Digital Document Security with the AES-128 Algorithm in Kindergarten Educational Institutions,” Betrik , vol. 16, no. 01, pp. 37–51, 2025, doi: 10.36050/fjb35559.

GG Putri, W. Styorini, and RD Rahayani, “Introduction With the rapid development of technology, the internet has become the main platform in the Theoretical Basis of Cryptography Cryptography is the science and art of maintaining the confidentiality of messages by means of Cryptographic Algorithms Cryptographic algorithms are also called ciphers, namely rules for enchiphering and Symmetric Algorithms These algorithms are also often called classical algorithms, because they use keys that Non-Symmetric Algorithms Non-symmetric algorithms are also often called public key algorithms, with the meaning,” pp. 197–207.

Downloads

Published

2026-02-15

How to Cite

Mazayah Tsaqofah, Juwita Sari, Nurhidayati, Adinda Tarisyah Hsb, Rizky Abdillah, & Mrs. Rusdi. (2026). Digital Image Data Security Using MATLAB -Based AES-128 Algorithm. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 5(2), 3027–3034. https://doi.org/10.59934/jaiea.v5i2.2089