Pengamanan Citra Menggunakan Kombinasi Algoritma Kriptografi Hill Cipher dan Teknik Transposisi Segitiga
Abstract
Keywords
Full Text:
PDFReferences
D. Rachmawati, M. A. Budiman, and C. A. Saffiera, ‘An Implementation Of Elias Delta Code And ElGamal Algorithm In Image Compression And Security’, IOP Conf. Ser. Mater. Sci. Eng., vol. 300, p. 012040, Jan. 2018, doi: 10.1088/1757-899X/300/1/012040.
H. Touil, N. E. Akkad, and K. Satori, ‘Text Encryption: Hybrid cryptographic method using Vigenere and Hill Ciphers.’, in 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, Morocco, Jun. 2020, pp. 1–6. doi: 10.1109/ISCV49265.2020.9204095.
Supiyanto and S. A. Mandowen, ‘Advanced hill cipher algorithm for security image data with the involutory key matrix’, J. Phys. Conf. Ser., vol. 1899, no. 1, p. 012116, May 2021, doi: 10.1088/1742-6596/1899/1/012116.
D. Rachmawati, M. A. Budiman, and L. Aulya, ‘Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm’, IOP Conf. Ser. Mater. Sci. Eng., vol. 308, p. 012003, Feb. 2018, doi: 10.1088/1757-899X/308/1/012003.
Handrizal, Herriyance, J. Hanayong, M. Zarlis, and P. Sihombing, ‘Implementation of Image Security using Elliptic Curve Cryptography RSA Algorithm and Least Significant Bit Algorithm’, J. Phys. Conf. Ser., vol. 1898, no. 1, p. 012016, Jun. 2021, doi: 10.1088/1742-6596/1898/1/012016.
D. Rachmawati, M. A. Budiman, and M. I. Wardhono, ‘Hybrid Cryptosystem for Image Security by Using Hill Cipher 4x4 and ElGamal Elliptic Curve Algorithm’, in 2018 IEEE International Conference on Communication, Networks and Satellite (Comnetsat), Medan, Indonesia, Nov. 2018, pp. 49–54. doi: 10.1109/COMNETSAT.2018.8684121.
M. Lakhera, M. M. S. Rauthan, and A. Agarwal, ‘Securing biometric template using double hill cipher with self-invertible key and random permutation of pixels locations’, in 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, India, Oct. 2016, pp. 814–817. doi: 10.1109/NGCT.2016.7877522.
J. R. Paragas, A. M. Sison, and R. P. Medina, ‘Hill Cipher Modification: A Simplified Approach’, in 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), Chongqing, China, Jun. 2019, pp. 821–825. doi: 10.1109/ICCSN.2019.8905360.
M. A. Budiman and A. Sharif, ‘Implementasi Operasi XOR dan Teknik Transposisi Segitiga untukPengamanan Citra JPEG Berbasis Android’, p. 17.
V. M. Putrie, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, ‘Super Encryption using Transposition-Hill Cipher for Digital Color Image’, in 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, Indonesia, Nov. 2018, pp. 152–157. doi: 10.1109/ISRITI.2018.8864361.
A. A. M. Khalaf, M. S. Abd El-Karim, and H. F. A. Hamed, ‘Proposed triple hill cipher algorithm for increasing the security level of encrypted binary data and its implementation using FPGA’, in 2015 17th International Conference on Advanced Communication Technology (ICACT), Seoul, Jul. 2015, pp. 454–459. doi: 10.1109/ICACT.2015.7224836.
A. Agung, N. Heryana, and A. Solehudin, ‘Combination of Hill Cipher Algorithm and Caesar Cipher Algorithm for Exam Data Security’, Buana Inf. Technol. Comput. Sci. BIT CS, vol. 1, no. 2, pp. 42–45, Jul. 2020, doi: 10.36805/bit-cs.v1i2.1072.
Unsplash, ‘Visual search | Unsplash’. https://unsplash.com/s/visual/c51985ce-208a-44c5-9666-f79dd84acfd2 (accessed Nov. 30, 2021).
V. Praveena, P. H. Manohara Varma, and B. Raju, ‘Image Encryption using SCAN Patterns & Hill Cipher’, in 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, India, May 2018, pp. 1983–1988. doi: 10.1109/RTEICT42901.2018.9012499.
DOI: https://doi.org/10.30743/infotekjar.v6i2.4713
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 Windi Saputri Simamora, Syahril Efendi, Erna Budhiarti Nababan

This work is licensed under a Creative Commons Attribution 4.0 International License.
InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan)
Program Studi Teknik Informatika - Universitas Islam Sumatera Utara
Website : http://jurnal.uisu.ac.id/index.php/infotekjar/index
Email : infotekjar@ft.uisu.ac.id
InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan) is licensed under a Creative Commons Attribution 4.0 International License