Journal of Computer Networks, Architecture and High Performance Computing
Vol. 2 No. 2 (2020): Computer Networks, Architecture and High Performance Computing

Implementation Gifford Method For Digital Image Security

Fauduziduhu Laia (STMIK Pelita Nusantara, Medan)
Erwin Panggabean (Lecturer Teknik Informatika, STMIK Pelita Nusantara, Medan)



Article Info

Publish Date
01 Jun 2020

Abstract

Rapid development of digital image technology secret causes images require security aspect. Reviews These digital secret image can be encrypted using cryptographic methods. After being encrypted, the image is randomized, so that if it is Obtained by an unauthorized party, the image has no meaning. The cryptographic algorithm used in this study is Gifford method. The Gifford method is a stream cipher, a symmetry encryption algorithm that transforms the data character by character. Gifford has 8 registers filled with key bits. The processes performed by the Gifford method are the Output Function process, the 1-bit Sticky Shift Right process, the 1-bit Left Shift process, the XOR operation and the shift register operation to the right. The decryption process must use the same key as the encryption process in order to Obtain the original image.

Copyrights © 2020






Journal Info

Abbrev

CNAPC

Publisher

Subject

Computer Science & IT Education

Description

Journal of Computer Networks, Architecture and Performance Computing is a scientific journal that contains all the results of research by lecturers, researchers, especially in the fields of computer networks, computer architecture, computing. this journal is published by Information Technology and ...