OPTIMASI ALGORITMA SUPER ENKRIPSI UNTUK MENINGKATKAN PENGAMANAN DATA CITRA DIGITALDALAM PENGIRIMAN MMS PADA PIRANTI CERDAS
DOI:
https://doi.org/10.34151/technoscientia.v5i2.536Keywords:
smart device, Multimedia Messaging Service (MMS), cryptographic, super encryption, steganographyAbstract
Advances in technology have made communication and information technology functions into convergent and known as ICT (Information and Communication Technology). Internet and smart devices have an important role as a medium for multimedia convergence at this time. Mobile communications technology also developed rapidly, as well as the development of features that support services in the GSM system, among others, is MMS (Multimedia Messaging Service) that allows data transmission such as images, audio, and video.Computational complexity becomes an important concern in the development of cryptographic techniques on smart devices in the limited of bandwidth on wireless networks, also limited processing, memory, and time. This paper will discuss the security of image message using the concept of super encryption to optimize security of encryption key that adopts the concept of steganography method called End Of File (EOF). Applications built able to combine the speed, security, and flexibility so as to produce a good combination of speed, high security, complexity, reasonable computational overhead, and computational power.Image encryption algorithm is successfully implemented on a smart device with Android based operating system. Application also has the fastprocess and efficient computing resource. These are evidenced by the average time of encryption for image size of 256 x 256 pixels at 0.75 seconds and the image with a size of 480 x 640 pixels at 2.09 seconds. Average time decryption to image size of 256 x 256 pixels by 0.58 seconds and the image with a size of 480 x 640 pixels of 1.66 seconds.
References
Anneria, Y.S, (2008). Program Stegonalis Metode LSB pada Citra dengan Enhanced LSB, Uji Chi Square, dan RS-Analysis. Tugas Akhir. Program Studi Teknik Informatika ITB, Bandung.
Iswahyudi, C. Setyaningsih, E. Widyastuti, N. (2012). “Pengamanan Kunci Enkripsi Citra pada Algoritma Super Enkripsi Menggunakan Metode End of File”. Prosiding Seminar Nasional Aplikasi Sains & Teknologi (SNAST) Periode III. ISSN: 1979-911X.
Fridrich. J., dan Goljan. M. (2002). Practical Steganalysis of Digital Images. State of The Art, Department of Electrical Engineering. Binghamton.
Gupta K, Silakari S. (2009). “Choase Based Image Encryption Using Block Based Transformation Algorithm”. International Journal of Computer and Network Security. 1(3).
Jolfaei A, Mirghadri A. (2011). “Image Encryption Using Chaos and Block Cipher”. Computer and Information Science. 4(1).
Krikor L, Baba S, Arif T, Shaaban Z. (2009). “Image Encryption Using DCT and Stream Cipher”. European Journal of Scientific Research. http://www.eurojour-nals.com/ejsr.htm. ISSN 1450-216X ; 32(1): 47-57.
Manglem, Kh. S., Birendra, S. S., Shyam, L. S. S. (2007). Hiding Encrypted Message in Features Image. IJCSNS. Vol. 7 No. 4. India.
Puech, W. dan Rodrigues, J. (2005), Crypto-compression of Medical Images by Aelective Encryption of DCT. 13th European Signal Processing Conference. Turkey.
Setyaningsih E, Iswahyudi C, Widyastuti N. (2012). “Image Encryption on Mobile Phone Using Super Encryption Algorithm”. Jurnal Ilmiah Nasional Terakreditasi TELKOMNIKA. ISSN : 1693-6930. 10(4): 599-608.
Stinson R Douglas. (1005). Cryptography Theory and Practice. London: CRC Press. Inc.
Younes, M A B , Jantan A. (2008). “Image Encryption Using Block Based Transformation Algorithm” . IAENG International Journal of Computer Science. 35(1).