Comparative Analysis Of Chaotic Cat MAP And Fibonacci Image Scrambling Methods To Secure Digital Image Comparative Analysis Of Chaotic Cat MAP And Fibonacci Image Scrambling Methods To Secure Digital Image
Main Article Content
Abstract
In the process of communication through the internet network, security is an important issue that needs serious attention. This is because the process of sending and communicating data through the internet has the possibility to be intercepted by other parties. This also applies to image data. Therefore, data to be sent via the internet must be secured first. However, the application of several cryptographic methods and several methods of randomization of images requires a relatively long time. To solve the problems encountered, the Image Scrambling Generalized Fibonacci And Chaotic Cat Map algorithm can be applied. The work process of the algorithm will start from the process of selecting the input image and charging the key value that will be used. After that, the process continues with the process of randomizing the image, so that it will produce a randomized image. The resulting image can be reconstructed again by applying an anti-scrambling algorithm. This process requires the same key to be used at the scrambling stage. The resulting application can randomize the original image by filling in the randomization key value. The resulting image can be reconstructed again using the same key. In addition, the application will also produce detailed reports of calculations performed during the scrambling and anti-scrambling processes for each of these methods.
Downloads
Article Details
[2] Canaan, C., M. S., Garai dan M. Daya, (2011). All About Fibonacci: A python approach, World Applied Programming Vol (1), No (1), ISSN 2222-2510.
[3] Chandrasekhar, A., D. Chaya Kumari, CH. Pragathi dan Ashok Kumar, (2016). Multiple Encryption of Independent Ciphers, International Journal of Mathematical Archive-7(2), ISSN 2229-5046.
[4] El Abbadi, N. K., S. T. Abaas dan A. A. Alaziz, (2016). New Image Encryption Algorithm Based on Diffie-Hellman dan Singular Value Decomposition, International Journal of Advanced Research in Computer and Communication Engineering, Vol.5, ISSN 2319-5940.
[5] Jiancheng Zou, Rabab K. Ward dan Dongxu Qi (2004). The Generalized Fibonacci Tranformations and Application to Image Scrambling. IEEE.
[6] Liu Xiangdong, Zhang Junxing, Zhang Jinhai, He Xiqin. (2008). Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation, IJCSNS International Journal of Comptuer Sicence and Network Security, Vol 8 No.1.
[7] Rinaldi Munir, 2004, Pengantar Pengolahan Citra, PT. Elex Media Komputindo, Jakarta.
[8] Siregar, S. D., Lestari, Ernala, I., Simarmata, D. P., Naingolan, A. S., (2019). Pencocokan Foto Berdasarkan wajah dengan Menggunakan Metode Kohonen. Journal of Informatic Pelita Nusantara, Vol 4 No. 1.
[9] T. Sutoyo, Edy Mulyanto, Dr.Vincent Suhartono, Oky Dwi Nurhayati, Wijanarto, 2009, Teori Pengolahan Citra Digital, Penerbit Andi Offset, Yogyakarta.
[10] Zhu Liehuang, Li Wenzhou, Liao Lejian dan Li Hong (2006). A Novel Image Scrambling Algorithm for Digital Watermarking Based on Chaotic Sequence. IJCSNS, International Journal of Computer Science and Network Security, Vol 6, No. 8B.