Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control

Improved Chaotic Image Encryption on Grayscale Colorspace Using Elliptic Curves and 3D Lorenz System Sinaga, Daurat; Jatmoko, Cahaya; Astuti, Erna Zuni; Rachmawanto, Eko Hari; Abdussalam, Abdussalam; Pramudya, Elkaf Rahmawan; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Doheir, Mohamed
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2251

Abstract

Digital data, especially visual content, faces significant security challenges due to its susceptibility to eavesdropping, manipulation, and theft in the modern digital landscape. One effective solution to address these issues is the use of encryption techniques, such as image encryption algorithms, that ensure the confidentiality, integrity, and authenticity of digital visual content. This study addresses these concerns by introducing an advanced image encryption method that combines Elliptic Curve Cryptography (ECC) with the 3D Lorenz chaotic system to enhance both security and efficiency. The method employs pixel permutation, ECC-based encryption, and diffusion using pseudo-random numbers generated by the Lorenz 3D system. The results show superior performance, with an MSE of 3032 and a PSNR of 8.87 dB, as well as UACI and NPCR values of 33.34% and 99.64%, respectively, indicating strong resilience to pixel intensity changes. During testing, the approach demonstrated robustness, allowing only the correct key to decrypt images accurately, while incorrect or modified keys led to distorted outputs, ensuring encryption reliability. Future work could explore extending the method to color images, optimizing processing for larger datasets, and incorporating additional chaotic systems to further fortify encryption strength.
Optimized Visualization of Digital Image Steganography using Least Significant Bits and AES for Secret Key Encryption Jatmoko, Cahaya; Sinaga, Daurat; Lestiawan, Heru; Astuti, Erna Zuni; Sari, Christy Atika; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Yaacob, Noorayisahbe Mohd
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2252

Abstract

Data hiding is a technique used to embed secret information into a cover medium, such as an image, audio, or video, with minimal distortion, ensuring that the hidden data remains imperceptible to an observer. The key challenge lies in embedding secret information securely while maintaining the original quality of the host medium. In image-based data hiding, this often means ensuring the hidden data cannot be easily detected or extracted while still preserving the visual integrity of the host image. To overcome this, we propose a combination of AES (Advanced Encryption Standard) encryption and Least Significant Bit (LSB) steganography. AES encryption is used to protect the secret images, while the LSB technique is applied to embed the encrypted images into the host images, ensuring secure data transfer. The dataset includes grayscale 256x256 images, specifically "aerial.jpg," "airplane.jpg," and "boat.jpg" as host images, and "Secret1," "Secret2," and "Secret3" as the encrypted secret images. Evaluation metrics such as Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Unified Average Changing Intensity (UACI), and Number of Pixels Changed Rate (NPCR) were used to assess both the image quality and security of the stego images. The results showed low MSE (0.0012 to 0.0013), high PSNR (58 dB), and consistent UACI and NPCR values, confirming both the preservation of image quality and the effectiveness of encryption for securing the secret data.
Co-Authors Abdussalam Abdussalam, Abdussalam Affandy Affandy Aisyatul Karima Andrean, Muhammad Niko Andreas Wilson Setiawan Anggraini, Fitria Anhsori, Khusman Astuti, Yani Parti Azzahra, Tarissa Aura Budi Harjo Cahaya Jatmoko Catur Supriyanto Catur Supriyanto Catur Supriyanto Catur Supriyanto Chaerul Umam Chaerul Umam Christy Atika Sari Dewi Pergiwati Dliyauddin, Muhammad Doheir, Mohamed Dwi Eko Waluyo Dwi Puji Prabowo, Dwi Puji Dzaky, Azmi Abiyyu Edi Noersasongko Egia Rosi Subhiyakto, Egia Rosi Eko Hari Rachmawanto Elkaf Rahmawan Pramudya Erlin Dolphina Erna Zuni Astuti Fafaza, Safira Alya Fajrian Nur Adnan Fakhrurrozi Fakhrurrozi, Fakhrurrozi Firmansyah, Rusmal Harun Al Azies Hayu Wikan Kinasih Heru Lestiawan I Ketut Eddy Purnama Ika Pantiawati Islam, Hussain Md Mehedul Junta Zeniarja Kusuma, Edi Jaya Kusumawati, Yupie L. Budi Handoko Lenci Aryani Megantara, Rama Aria Mochamad Hariadi Muhammad Huda, Alam Muhammad Naufal, Muhammad Ningrum, Amanda Prawita Nurmandhani, Ririn Paramita, Cinantya Pergiwati, Dewi Praskatama, Vincentius Pujiono Pujiono Pulung Nurtantio Andono Purwanto Purwanto Putra, Permana Langgeng Wicaksono Ellwid Rafsanjani, Muhammad Ivan Rahadian, Arief Ramadhan Rakhmat Sani Ramadhani, Irfan Wahyu Rastri Prathivi Ratmana, Danny Oka Ricardus Anggi Pramunendar Riri Damayanti Apnena Rohman, Muhammad Syaifur Saputra, Filmada Ocky Saraswati, Galuh Wilujeng Sarker, Md. Kamruzzaman Savicevic, Anamarija Jurcev Shier Nee Saw Sinaga, Daurat Sindhu Rakasiwi Soeleman, M. Arief Sri Winarno Swanny Trikajanti Widyaatmadja Vincent Suhartono Wahyu Adi Nugroho Wellia Shinta Sari Winarsih, Nurul Anisa Sri Yaacob, Noorayisahbe Mohd Yani Parti Astuti Zainal Arifin Hasibuan Zami, Farrikh Al Zul Azri bin Muhamad Noh