Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control

A Super Encryption Approach for Enhancing Digital Security using Column Transposition - Hill Cipher for 3D Image Protection Handoko, Lekso Budi; Umam, Chaerul
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 3, August 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i3.1984

Abstract

Image encryption is an indispensable technique in the realm of information security, serving as a pivotal mechanism to safeguard visual data against unauthorized access and potential breaches. This study scrutinizes the effectiveness of merging columnar transposition with the Hill Cipher methodologies, unveiling specific metrics from a curated set of sample images. Notably, employing column transposition with the key "JAYA" and the Hill Cipher with the key "UDINUSSMG," the encrypted images underwent rigorous evaluation. 'Lena.png' demonstrated an MSE of 513.32 with a PSNR of 7.89 dB, while 'Peppers.png' and 'Baboon.png' recorded MSE values of 466.67 and 423.92, respectively, with corresponding PSNR figures of 7.12 dB and 7.31 dB. Across all samples, a consistent BER of 50.00% indicated uniform error propagation, while entropy values settled uniformly at 7.9999, highlighting consistent data complexity. While the findings underscore a consistent error rate and complexity, there's a compelling need for further refinement to enhance image quality and security. Moreover, the study proposes future research avenues exploring a three-layer super encryption paradigm, amalgamating columnar transposition, Hill Cipher, and other robust algorithms. This approach aims to fortify encryption methodologies against evolving threats and challenges in data protection, offering heightened resilience and efficacy in safeguarding sensitive information.
Co-Authors ., Muslih Abdus Salam, Abdus Abdussalam Abdussalam Abu Salam Abu Salam Acun Kardianawati Ade Surya Ramadhan Adelia Syifa Anindita Aisyah, Ade Nurul Aisyatul Karima Aisyatul Karima Ajib Susanto Al zami, Farrikh Alzami, Farrikh Andi Danang Krismawan Ardytha Luthfiarta Ari Saputro Ari Saputro, Ari ARIANTO, EKO Ariya Pramana Putra Ariyanto, Noval Budi Harjo Budi, Setyo Cahaya Jatmoko Chaerul Umam Chaerul Umam Chaerul Umam Chaerul Umam Chaerul Umam Christy Atika Sari De Rosal Ignatius Moses Setiadi Eko Hari Rachmawanto Elkaf Rahmawan Pramudya Erwin Yudi Hidayat Erwin Yudi Hidayat Etika Kartikadarma Fauzi Adi Rafrastara Fikri Firdaus Tananto Fikri Firdaus Tananto Filmada Ocky Saputra Firman Wahyudi, Firman Ghulam Maulana Rizqi Guruh Fajar Shidik Hafiidh Akbar Sya'bani Hanif Setia Nusantara Hanny Haryanto Hasan Aminda Syafrudin Hendy Kurniawan Herfiani, Kheisya Talitha Irfannandhy, Rony Irwan, Rhedy Isinkaye, Folasade Olubusola Izza Khaerani Ja'far, Luthfi Junta Zeniarja Karima, Nida Aulia Khafiizh Hastuti Khafiizh Hastuti Lucky Arif Rahman Hakim Maulana Ikhsan Megantara, Rama Aria Mira Nabila Mira Nabila Muhammad Jamhari Muslih Muslih Muslih Muslih Nurhindarto, Aris Ocky Saputra, Filmada Oki Setiono Pulung Nurtantio Andono Raihan Yusuf Rama Aria Megantara Ramadhan Rakhmat Sani Reza Pahlevi, Mohammad Rizky Rizqy, Aditya Rofiani, Rofiani Saputra, Filmada Ocky Saputri, Pungky Nabella Sarker, Md. Kamruzzaman Sendi Novianto Silla, Hercio Venceslau Soeleman, M Arief Sya'bani, Hafiidh Akbar Umi Rosyidah Valentino Aldo Wellia Shinta Sari Wildanil Ghozi