Digital Image Data Security Using MATLAB -Based AES-128 Algorithm
DOI:
https://doi.org/10.59934/jaiea.v5i2.2089Keywords:
AES-128, Digital Image, Encryption, Decryption, MatlabAbstract
Digital images are widely used for storing and transmitting sensitive information , so that aspect data security is becoming very important. This research discuss digital image data security using the Advanced Encryption Standard (AES) algorithm with a long key 128 bit implemented in MATLAB environment. The method used is cryptography . symmetric , where the encryption and decryption processes use a key the same secret . The encryption process done to randomize the pixel value of the original image so that visual information cannot be recognized , while the decryption process aim return image encrypted to condition back to the beginning without data changes . System evaluation done through histogram analysis , process time measurement , and evaluation quality image using the Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) parameters. The test results show that The encrypted image has a random histogram pattern and does not resemble original image . In addition that , the decryption process produce MSE value of zero and PSNR value not finite , which indicates the absence of lost information . Thus , it can concluded that the MATLAB -based AES-128 algorithm is effective and reliable in improving the security of digital image data .
Downloads
References
D. Pramudia, A. Fitriansyah, and R. Ramliyana, “A Hybrid Application of EOF Steganography and AES-128 Encryption for PDF File Security on Android,” J. Ris. and Apl. Mhs. Inform. , vol. 2, no. 03, pp. 437–444, 2021, doi: 10.30998/jrami.v2i03.1144.
S. Wijaya, “Analysis of Late Payments in Industry,” vol. 11, no. 2, pp. 166–177, 2024.
R. Rahmawati and D. Rahardjo, “Data Security Application Using Discrete Cosine Transform Steganography Algorithm and AES 128 BIT Cryptography at SMK PGRI 15 Jakarta,” J. Tech. Inform. and Sist. Inf. , vol. 2, no. April, pp. 67–74, 2023.
DC Anggarini and C. Kurniawan, “DESIGN OF AES RIJNDAEL ALGORITHM APPLICATION FOR 128 BIT JPEG FILE DIGITAL IMAGE ENCRYPTION,” 2024.
Ismai, “Textbook of Basic Concepts of Website Programming with PHP,” vol. 7, pp. 51–61, 2024.
ADIBDI Journal, MTIMM Dr. Ir. Untung Rahardja, K. Zelina, and ADI PUBLISHER, ADI Interdisciplinary Digital Business Journal (ABDI Journal) First Edition Vol 1. No 1. June 2020. ADI Publisher, 2021.
R. Rahman et al. , Computer Network Security Textbook . Jambi: PT. Sonpedia Publishing Indonesia, 2024.
Galih Yuga Pangestu, Asep Id Hadiana, and Puspita Nurul Sabrina, “Cryptography for Double Encryption of Images Using AES (Advanced Encryption Standard) and RC5 (Rivest Code 5) Algorithms,” Informatics Digit. Expert , vol. 4, no. 1, pp. 25–32, 2022.
F. Nuraeni, S. Tinggi, T. Garut, and D. Kurniadi, “Implementation of QR-Code and Digital Signature Schemes using a Combination of RSA and AES Algorithms for Electronic Certificate Data Security Academic Information System View project Educational Data Mining View project,” pp. 43–52, 2020.
A. Sapaatullah and M. Darip, “Web-Based Digital Document Security with the AES-128 Algorithm in Kindergarten Educational Institutions,” Betrik , vol. 16, no. 01, pp. 37–51, 2025, doi: 10.36050/fjb35559.
GG Putri, W. Styorini, and RD Rahayani, “Introduction With the rapid development of technology, the internet has become the main platform in the Theoretical Basis of Cryptography Cryptography is the science and art of maintaining the confidentiality of messages by means of Cryptographic Algorithms Cryptographic algorithms are also called ciphers, namely rules for enchiphering and Symmetric Algorithms These algorithms are also often called classical algorithms, because they use keys that Non-Symmetric Algorithms Non-symmetric algorithms are also often called public key algorithms, with the meaning,” pp. 197–207.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Journal of Artificial Intelligence and Engineering Applications (JAIEA)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.








