ac

Implementation Gifford Method For Digital Image Security

Authors

  • Fauduziduhu Laia STMIK Pelita Nusantara, Medan
  • Erwin Panggabean Lecturer Teknik Informatika, STMIK Pelita Nusantara, Medan

DOI:

10.47709/cnapc.v2i2.418

Keywords:

Encryption, pixel color, Gifford

Dimension Badge Record



Abstract

Rapid development of digital image technology secret causes images require security aspect. Reviews These digital secret image can be encrypted using cryptographic methods. After being encrypted, the image is randomized, so that if it is Obtained by an unauthorized party, the image has no meaning. The cryptographic algorithm used in this study is Gifford method. The Gifford method is a stream cipher, a symmetry encryption algorithm that transforms the data character by character. Gifford has 8 registers filled with key bits. The processes performed by the Gifford method are the Output Function process, the 1-bit Sticky Shift Right process, the 1-bit Left Shift process, the XOR operation and the shift register operation to the right. The decryption process must use the same key as the encryption process in order to Obtain the original image.

Downloads

Download data is not yet available.
Google Scholar Cite Analysis
Abstract viewed = 393 times

References

[1] Ario, Implementation of Presidential Decree No. 26 of 2009 on the Implementation of E-KTP NIK Based in Samarinda, E-journal Science of Government, 2014.
[2] Ariyus, D. Introduction to Cryptography. Andi, Yogyakarta. 2013.
[3] Basuki, et al. Digital Image Processing Using Visual Basic, Graha Science, Yogyakarta, 2015.
[4] Kadir, A. and Susan, A. Theory and Application of Image Processing. Andi, Yogyakarta, 2013.
[5] Kartika, et al. Implementation seal on Data Security, Ambassador Christian University Discourse, Yogyakarta, 2010.
[6] Mollin, RA An Introduction to Cryptography. 2nd ed. Florida: Chapman & Hall / CRC, 2010.
[7] Mesterjon, B. and Zulita, LN Implementation Method for Determining Value Selection Sort Student Achievement Class 3 and Class 4 SD Negeri 107 Seluma, University Dehasen, Bengkulu, 2015.
[8] Munir, R. Discrete Mathematics, Revised Fifth, Informatics, Bandung, 2012.
[9] Munir, R. Cryptography. Informatics, Bandung, 2016.
[10] Son, D. Digital Image Processing. Andi, Yogyakarta, 2010.
[11] Schneier, B. Applied Crytography. John Wiley and Sons Inc., Canada, 2016.
[12] Sutoyo, T., et al. Theory of Digital Image Processing. Andi, Yogyakarta, 2010

Downloads

ARTICLE Published HISTORY

Submitted Date: 2019-11-21
Accepted Date: 2019-11-27
Published Date: 2020-06-01

How to Cite

Laia, F., & Panggabean, E. (2020). Implementation Gifford Method For Digital Image Security. Journal of Computer Networks, Architecture and High Performance Computing, 2(2), 237-244. https://doi.org/10.47709/cnapc.v2i2.418