Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control

Discrete Cosine Transform and Singular Value Decomposition Based on Canny Edge Detection for Image Watermarking Astuti, Erna Zuni; Sari, Christy Atika; Rachmawanto, Eko Hari; Astuti, Yani Parti; Oktaridha, Harwinanda; Isinkaye, Folasade Olubusola
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1768

Abstract

The development of an increasingly sophisticated internet allows for the distribution of digital images that can be done easily. However, with the development of increasingly sophisticated internet networks, it becomes an opportunity for some irresponsible people to misuse digital images, such as taking copyrights, modification and duplicating digital images. Watermarking is an information embedding technique to show ownership descriptions that can be conveyed into text, video, audio, and digital images. There are 2 groups of watermarking based on their working domain, namely the spatial domain and the transformation domain. In this study, three domain transformation techniques were used, namely Singular Value Descomposition (SVD), Discrete Cosine Transform (DCT) and Canny Edge Detection Techniques. The proposed attacks are rotation, gaussian blurness, salt and pepper, histogram equalization, and cropping. The results of the experiment after inserting the watermark image were measured by the Peak Signal to Noise Ratio (PSNR). The results of the image robustness test were measured by the Correlation Coefficient (Corr) and Normalized Correlation (NC). The analysis and experimental results show that the results of image extraction are good with PSNR values from watermarked images above 50dB and Corr values reaching 0.95. The NC value obtained is also high, reaching 0.98. Some of the extracted images are of fairly good quality and are similar with the original image.
A Hybrid Encryption using Advanced Encryption Standard and Arnold Scrambling for 3D Color Images Sari, Wellia Shinta; Astuti, Erna Zuni; Jatmoko, Cahaya
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 1, February 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i1.2058

Abstract

Digital security ensuring the confidentiality and integrity of visual data remains a paramount challenge. The escalating sophistication of cyber threats necessitates robust encryption methods to safeguard sensitive information from unauthorized access and manipulation. Despite the development of various encryption techniques, inherent vulnerabilities exist within conventional methods that can be exploited by attackers. Therefore, this research aims to investigate the effectiveness of the combined approach of Arnold Scrambling and Advanced Encryption Standard (AES) in mitigating these vulnerabilities and providing a more secure solution. The primary goal of this research is to enhance the security of digital images by mitigating vulnerabilities associated with conventional encryption methods. Arnold Scrambling introduces chaotic mapping to disperse pixel values, while Advanced Encryption Standard (AES) provides robust cryptographic strength through its substitution-permutation network. By combining these methods in an ensemble fashion, the encryption process achieves heightened resilience against various cryptographic attacks. The proposed methodology was evaluated by using standard metrics including Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR), and entropy analysis. Results indicate consistent performance across multiple test images, namely: Lena, Mandrill, Cameraman, and Plane with Unified Average Changing Intensity (UACI) averaging 33.6% and Number of Pixels Change Rate (NPCR) nearing 99.8%. Entropy values approached maximum, affirming the efficacy of the encryption in generating highly randomized outputs.
Improved Chaotic Image Encryption on Grayscale Colorspace Using Elliptic Curves and 3D Lorenz System Sinaga, Daurat; Jatmoko, Cahaya; Astuti, Erna Zuni; Rachmawanto, Eko Hari; Abdussalam, Abdussalam; Pramudya, Elkaf Rahmawan; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Doheir, Mohamed
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2251

Abstract

Digital data, especially visual content, faces significant security challenges due to its susceptibility to eavesdropping, manipulation, and theft in the modern digital landscape. One effective solution to address these issues is the use of encryption techniques, such as image encryption algorithms, that ensure the confidentiality, integrity, and authenticity of digital visual content. This study addresses these concerns by introducing an advanced image encryption method that combines Elliptic Curve Cryptography (ECC) with the 3D Lorenz chaotic system to enhance both security and efficiency. The method employs pixel permutation, ECC-based encryption, and diffusion using pseudo-random numbers generated by the Lorenz 3D system. The results show superior performance, with an MSE of 3032 and a PSNR of 8.87 dB, as well as UACI and NPCR values of 33.34% and 99.64%, respectively, indicating strong resilience to pixel intensity changes. During testing, the approach demonstrated robustness, allowing only the correct key to decrypt images accurately, while incorrect or modified keys led to distorted outputs, ensuring encryption reliability. Future work could explore extending the method to color images, optimizing processing for larger datasets, and incorporating additional chaotic systems to further fortify encryption strength.
Optimized Visualization of Digital Image Steganography using Least Significant Bits and AES for Secret Key Encryption Jatmoko, Cahaya; Sinaga, Daurat; Lestiawan, Heru; Astuti, Erna Zuni; Sari, Christy Atika; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Yaacob, Noorayisahbe Mohd
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2252

Abstract

Data hiding is a technique used to embed secret information into a cover medium, such as an image, audio, or video, with minimal distortion, ensuring that the hidden data remains imperceptible to an observer. The key challenge lies in embedding secret information securely while maintaining the original quality of the host medium. In image-based data hiding, this often means ensuring the hidden data cannot be easily detected or extracted while still preserving the visual integrity of the host image. To overcome this, we propose a combination of AES (Advanced Encryption Standard) encryption and Least Significant Bit (LSB) steganography. AES encryption is used to protect the secret images, while the LSB technique is applied to embed the encrypted images into the host images, ensuring secure data transfer. The dataset includes grayscale 256x256 images, specifically "aerial.jpg," "airplane.jpg," and "boat.jpg" as host images, and "Secret1," "Secret2," and "Secret3" as the encrypted secret images. Evaluation metrics such as Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Unified Average Changing Intensity (UACI), and Number of Pixels Changed Rate (NPCR) were used to assess both the image quality and security of the stego images. The results showed low MSE (0.0012 to 0.0013), high PSNR (58 dB), and consistent UACI and NPCR values, confirming both the preservation of image quality and the effectiveness of encryption for securing the secret data.