Implementation Gifford Method For Digital Image Security
DOI:
10.47709/cnapc.v2i2.418Keywords:
Encryption, pixel color, GiffordDimension Badge Record
Abstract
Rapid development of digital image technology secret causes images require security aspect. Reviews These digital secret image can be encrypted using cryptographic methods. After being encrypted, the image is randomized, so that if it is Obtained by an unauthorized party, the image has no meaning. The cryptographic algorithm used in this study is Gifford method. The Gifford method is a stream cipher, a symmetry encryption algorithm that transforms the data character by character. Gifford has 8 registers filled with key bits. The processes performed by the Gifford method are the Output Function process, the 1-bit Sticky Shift Right process, the 1-bit Left Shift process, the XOR operation and the shift register operation to the right. The decryption process must use the same key as the encryption process in order to Obtain the original image.
Downloads
Abstract viewed = 393 times
References
[2] Ariyus, D. Introduction to Cryptography. Andi, Yogyakarta. 2013.
[3] Basuki, et al. Digital Image Processing Using Visual Basic, Graha Science, Yogyakarta, 2015.
[4] Kadir, A. and Susan, A. Theory and Application of Image Processing. Andi, Yogyakarta, 2013.
[5] Kartika, et al. Implementation seal on Data Security, Ambassador Christian University Discourse, Yogyakarta, 2010.
[6] Mollin, RA An Introduction to Cryptography. 2nd ed. Florida: Chapman & Hall / CRC, 2010.
[7] Mesterjon, B. and Zulita, LN Implementation Method for Determining Value Selection Sort Student Achievement Class 3 and Class 4 SD Negeri 107 Seluma, University Dehasen, Bengkulu, 2015.
[8] Munir, R. Discrete Mathematics, Revised Fifth, Informatics, Bandung, 2012.
[9] Munir, R. Cryptography. Informatics, Bandung, 2016.
[10] Son, D. Digital Image Processing. Andi, Yogyakarta, 2010.
[11] Schneier, B. Applied Crytography. John Wiley and Sons Inc., Canada, 2016.
[12] Sutoyo, T., et al. Theory of Digital Image Processing. Andi, Yogyakarta, 2010