Encryption and Description of RGB Values in Images Using the Hill Chiper Algorithm
Abstract
Information security related to computer use cannot be separated from cryptography. Hill cipher is an application of modulo arithmetic in cryptography. This cryptography technique uses a square matrix as the key used to carry out encryption and decryption. This cryptographic technique was created with the intention of being able to create ciphers (codes) that cannot be broken using frequency analysis techniques. Hill Cipher does not replace each of the same letters in the plaintext with other letters that are the same in the ciphertext because it uses matrix multiplication as a basis for encryption and decryption. Hill Cipher cryptography is a type of classic cryptography that uses a substitution method by providing random keys and the number is the same as the plaintext. The use of encryption and decryption using the Hill cipher algorithm is to help secure data so that it is not easily falsified or accessed by irresponsible people by changing the original image into a different form where the image is not easy to recognize. The encryption and decryption process was designed using the Java programming language using NetBeans 8.2 and the Hill Cipher algorithm to encrypt RGB digital images
Downloads
References
Widyanarko, arya. 2007. Studi dan Analisis mengenai Hill Cipher, Teknik Kriptanalisis dan Upaya Penanggulangannya. Bandung: Fakultas Teknik ITB
Ariyus, D. (2006).”Kriptografi Keamanan Data dan Kriptografi”.Yogyakarta: Penerbit Andi Offset
Sindar, A., & Sinaga, R. M. (2017). Implementasi Teknik Threshoding Pada Segmentasi Citra Digital. IMPLEMENTASI TEKNIK THRESHODING PADA SEGMENTASI CITRA DIGITAL, 1(2), 48–51.
Maulana, A.,R. (2012). “Penerapan Algoritma WAKE Pada Aplikasi Chatting & Internet Monitor Berbasis LAN”. Yogyakarta: STMIK Amikom Yogyakarta.
Sindar, A., & Sinaga, R. M. (2017). Implementasi Teknik Threshoding Pada Segmentasi Citra Digital. IMPLEMENTASI TEKNIK THRESHODING PADA SEGMENTASI CITRA DIGITAL, 1(2), 48–51.
Muamal Khoerudin (2015, Maret 22-29). Algoritma Hill Cipher (Sandi Hill) Materi Perkuliahan Pada Jurusan Teknik Informatika
Achriadi, T. Sukma (2019), Journal Publications & Informatics Engineering Research, Feature Extraction Method GLCM and LVQ in Digital Image-Based Face Recognition,(4:1 october 2019)
Sindar, A., & Sinaga, R. M. (2017). Implementasi Teknik Threshoding Pada Segmentasi Citra Digital. IMPLEMENTASI TEKNIK THRESHODING PADA SEGMENTASI CITRA DIGITAL, 1(2), 48–51.
Sindar, A., & Sinaga, R. M. (2017). Implementasi Teknik Threshoding Pada Segmentasi Citra Digital. IMPLEMENTASI TEKNIK THRESHODING PADA SEGMENTASI CITRA DIGITAL, 1(2), 48–51.
. Suryadi, H.S., dkk.. Teori Dan Soal Pendahuluan Aljabar Linier. Serial Matematika. Jakarta: Ghalia Indonesia. 1990
Sindar, A., & Sinaga, R. M. (2017). Implementasi Teknik Threshoding Pada Segmentasi Citra Digital. IMPLEMENTASI TEKNIK THRESHODING PADA SEGMENTASI CITRA DIGITAL, 1(2), 48–51.
Aplikasi Desktop. (2023). Diperoleh 29 April 2023, dari https://javatekno.co.id/page/aplikasi-desktop