An Enhancement of One Time Pad Based on Monoalphabeth Caesar Cipher to Secure Grayscale Image
Abstract
Full Text:
PDFReferences
J. Thakur and N. Kumar, “DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis,†Int. J. Emerg. Technol. Adv. Eng., vol. 1, no. 2, pp. 6–12, 2011.
M. G. V. Kumar and U. S. Ragupathy, “A Survey on current key issues and status in cryptography,†in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 205–210.
A. Blair, “Learning the Caesar and Vigenere Cipher by hierarchical evolutionary re-combination,†in 2013 IEEE Congress on Evolutionary Computation, 2013, pp. 605–612.
C. A. Sari, E. H. Rachmawanto, D. W. Utomo, and R. R. Sani, “Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting,†J. Appl. Intell. Syst., vol. 1, no. 3, pp. 179–190, 2016.
D. R. I. M. Setiadi, E. H. Rachmawanto, and C. Sari, “Secure Image Steganography Algorithm Based on DCT with OTP Encryption,†J. Appl. Intell. Syst., vol. 2, no. 1, pp. 1–11, 2017.
A. Al-haj and H. Abdel-nabi, “Digital Image Security Based on Data Hiding and Cryptography,†in International Conference on Information Management Copyright, 2017, pp. 437–440.
L. Erawan, C. A. Sari, and E. H. Rachmawanto, “Lalang_Erawan_Implementasi_Kriptografi_Simetris_OTP,†in Seminar Nasional Multidisiplin Ilmu Universitas Budi Luhur Jakarta, 2017.
C. A. Sari and E. H. Rachmawanto, “Gabungan Algoritma Vernam Chiper Dan End of File,†Techno.COM, vol. 13, no. 3, pp. 150–157, 2014.
E. H. Rachmawanto and C. A. Sari, “Keamanan File Menggunakan Teknik Kriptografi Shift Cipher,†Techno.COM, vol. 14, no. 4, pp. 329–335, 2015.
A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, “Digital Image Steganography : Survey and Analysis of Current Methods,†Signal Processing, vol. 90, no. 3, pp. 727–752, 2010.
C. Sari, E. Rachmawanto, Y. Astuti, and L. Umaroh, “Optimasi penyandian file menggunakan kriptografi shift cipher,†in Seminar Multi Disiplin Ilmu Unisbank (SENDI_U) ke-2 Semarang, 2016.
Y. P. Astuti, E. H. Rachmawanto, and C. A. Sari, “Optimasi Enkripsi Password Menggunakan Algoritma Blowfish,†Techno.COM, vol. 15, no. 1, pp. 15–21, 2016.
X. Li, W. Zhang, B. Ou, and B. Yang, “A brief review on reversible data hiding: Current techniques and future prospects,†in 2IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP), 2014, pp. 426–430.
R. Jain and J. B. Sharma, “Symmetric color image encryption algorithm using fractional DRPM and chaotic baker map,†in 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2016, pp. 1835–1840.
A. Goswami and S. Khandelwal, “Hybrid DCT-DWT Digital Image Steganography,†Int. J. Adv. Res. Comput. Commun. Eng. Vol., vol. 5, no. 6, pp. 228–233, 20 99o16.
DOI: https://doi.org/10.33633/jais.v2i2.1616
Article Metrics
Abstract view : 549 timesPDF - 484 times
Refbacks
- There are currently no refbacks.
Journal of Applied Intelligent System (e-ISSN : 2502-9401, p-ISSN : 2503-0493) is published by Department of Informatics Universitas Dian Nuswantoro Semarang and IndoCEISS.
Journal of Applied Intelligent System indexed by :
This journal is under licensed of Creative Commons Attribution 4.0 International License.