Enkripsi Data Citra untuk Model Warna RGB dan Treshold Menggunakan Algoritma Hill Cipher

Ommi Alfina

Abstract


With the increasingly widespread abuse of digital media, especially in the form of images or images, it increasingly disrupts the rights and privacy of everyone. Many forms of abuse that occur in digital media through internet facilities such as plagiarism of photographer's work, recognition of the rights of the image, to upload photos of privacy to internet media. Therefore, one way to secure digital data in the form of images is to randomize (encrypt) the images that we feel are very important so that the image can no longer be interpreted by others. If we need these data, we just need to return it (decryption) so that the encryption image can return to its original form. Hill Cipher algorithm is one method to randomize a data by encoding and multiplying the matrix. For its application in the form of image data, a trial is needed by creating a software which will then analyze the results into several color models such as RGB, Grayscale (Keabuan) and Tresholding (Black and White). From the test results, it can be concluded that the greater the input matrix value of the Hill Cipher Algorithm, the more encrypted image results will be obtained or in other words the more incomprehensible the visual form by humans. Then the Hill Cipher algorithm cannot be applied to the color threshold model (black and white) because the matrix multiplication obtained does not have a diverse range of values


Keywords


Hill Chiper, RGB, Enkripsi Citra

Full Text:

PDF

References


Anton, Howard. Aljabar Linear Elementer, Penerbit Erlangga, 1998.

Ariyus, Doni. Computer Security, Andi Yogyakarta, 2006.

Jogiyanto, H.M. Pengenalan Komputer, Andi offset, Yogyakarta, 1990.

Kurnia, Adi. Pemrograman Microsoft Visual Basic 6.Jakarta : PT. Elex Media

Komputindo Kelompok Gramedia, 1999.

Soehono, Stefanus. http://www.cert.or .id/~budi/courses/security/

Stefanus_Soehono_report.doc, 2006.

Stalling,William. Cryptography and Network Security Principles and Practices,

Pearson Education, 2003.

Wijaya,Rosyidah Jayanti..http://supriyanto.fisika.ui.edu/ matkom1.pdf, 2007.




DOI: https://doi.org/10.30743/infotekjar.v4i1.1675

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Ommi Alfina

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan)

Program Studi Teknik Informatika - Universitas Islam Sumatera Utara
Website : http://jurnal.uisu.ac.id/index.php/infotekjar/index
Email : infotekjar@ft.uisu.ac.id

InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan) is licensed under a Creative Commons Attribution 4.0 International License