Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control

Improved Chaotic Image Encryption on Grayscale Colorspace Using Elliptic Curves and 3D Lorenz System Sinaga, Daurat; Jatmoko, Cahaya; Astuti, Erna Zuni; Rachmawanto, Eko Hari; Abdussalam, Abdussalam; Pramudya, Elkaf Rahmawan; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Doheir, Mohamed
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2251

Abstract

Digital data, especially visual content, faces significant security challenges due to its susceptibility to eavesdropping, manipulation, and theft in the modern digital landscape. One effective solution to address these issues is the use of encryption techniques, such as image encryption algorithms, that ensure the confidentiality, integrity, and authenticity of digital visual content. This study addresses these concerns by introducing an advanced image encryption method that combines Elliptic Curve Cryptography (ECC) with the 3D Lorenz chaotic system to enhance both security and efficiency. The method employs pixel permutation, ECC-based encryption, and diffusion using pseudo-random numbers generated by the Lorenz 3D system. The results show superior performance, with an MSE of 3032 and a PSNR of 8.87 dB, as well as UACI and NPCR values of 33.34% and 99.64%, respectively, indicating strong resilience to pixel intensity changes. During testing, the approach demonstrated robustness, allowing only the correct key to decrypt images accurately, while incorrect or modified keys led to distorted outputs, ensuring encryption reliability. Future work could explore extending the method to color images, optimizing processing for larger datasets, and incorporating additional chaotic systems to further fortify encryption strength.
Co-Authors Aditya Rahmat Gunawan, Aditya Rahmat Apriliana, Yolin Inka Asep Wasid , Asep Wasid Aziz, M Ali Imron Abdul Budiman Budiman Budiman Fauzi, Budiman Fauzi Cahaya Jatmoko Chaerul Umam Christy Atika Sari Darwin Nahwan Dewi Arita, Dewi Arita Dila Sekar Arum Sari , Dila Sekar Arum Sari Dila Sekar Arum Sari, Dila Sekar Arum Sari Doheir, Mohamed Efni Yusnita, Efni Yusnita Eko Hari Rachmawanto Elkaf Rahmawan Pramudya Erna Zuni Astuti Fauzi Adi Rafrastara Fifi afiania, Fifi afiania Ganis Sanhaji, Ganis Ganis Sanhaji, Ganis Sanhaji Guntur Guntur Guntur Jakariya, Guntur Jakariya Guruh Fajar Shidik Heru Lestiawan Islam, Hussain Md Mehedul Iwan Satriyo Nugroho, Iwan Satriyo Nugroho Jan Setiawan Jiehad Akbar Pria Utama, Jiehad Akbar Pria Utama Jiehad Akbar Pria Utamay, Jiehad Akbar Pria Utamay Meylina, Nadila Moch Irwan Hermanto Moh. Ihsan Muhajirin, Muhajirin Muhammad rifai, Muhammad rifai Musyfiq Amrullah , Musyfiq Amrullah Musyfiq Amrullah, Musyfiq Amrullah Noneng Nurhayani, Noneng Nurhayani Nugraha, Arifinza Eska Nurtiyanto, Woro Agus Pebruari K.A, Ralintang Prayogo, Riyan Adi Pulung Nurtantio Andono Purwanto Purwanto Rafika Ratik Srimurni, Rafika Ratik Srimurni Rahmawati, Anisa Dwi Rahmi Rismayani Deri, Rahmi Rismayani Deri Ramadhan Rakhmat Sani Reina Marsela , Reina Marsela Reina marsela, Reina marsela Riko Darma Putra, Riko Darma Putra Riyansyah , Rico Rohmatunnissa, Rohmatunnissa RR. Ella Evrita Hestiandari Sa’adah, Dwi Lailatus Shabirin, Akbar Riadus Shofiyatun, Rosyta Sinaga, Daurat Sunardi Sunardi Syahroni Mustofa, Syahroni Mustofa Wellia Shinta Sari Wildanil Ghozi Zahara, Alfi Wahyu Zahroini, Inziana