Please use this identifier to cite or link to this item:
https://repository.unej.ac.id/xmlui/handle/123456789/111249
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | SANTOSO, Kiswara Agung | - |
dc.contributor.author | FATMAWATI, Fatmawati | - |
dc.contributor.author | SUPRAJITNO, Herry | - |
dc.date.accessioned | 2022-12-21T08:36:28Z | - |
dc.date.available | 2022-12-21T08:36:28Z | - |
dc.date.issued | 2017-08-08 | - |
dc.identifier.uri | https://repository.unej.ac.id/xmlui/handle/123456789/111249 | - |
dc.description.abstract | Recently the information system develops quickly, especially information system via internet. It’s happened because the Internet can be used by anyone, anywhere and anytime. The information on the Internet has various types of data such as text, video, audio, and image/photo. Although we can access the Internet easily, but the data which transfered through internet isn’t safe. It caused by hacker, someone who manipulate information so that data become different with the original. Many efforts have been done to make the data that transmitted over the Internet to be secure, for example make the coding, disguise or hide data into other media. In this paper we intend to present the results of research about image encryption techniques to increase the security of data (image) so that safe if the data is transfered via the internet. This encryption using symmetric-key. The key is 4 BIT or a real number between 0 15. This key will be processed by each pixel in the image using XOR operation. The next step the BIT of pixels are devided into two part, LSB (least significant bit) and MSB (Most significant bit). Both will be exchanged if the conditions have completed. We do that to get better results, that is file size of the image encryption is smaller than the original image. The results of this research are image encryption have significant differences with the original image, it can be proved by correlation between both images. Another advantage of this coding technique is the image encryption file size smaller than the original image file size so it can speed up of image transfer. Decode result of this coding technique is good enough, it can be seen from the mean square error (MSE) between the image encryption that has been restored to its original form and the original image. All the manufacturing process of encoding techniques have been simulated and analyzed using software MATLAB 2012a. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IBSC | en_US |
dc.subject | BIT | en_US |
dc.subject | Pixel | en_US |
dc.subject | XOR | en_US |
dc.title | Image Encryption Technique Based on Pixel Exchange and XOR Operation | en_US |
dc.type | Article | en_US |
Appears in Collections: | LSP-Conference Proceeding |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
F MIPA_PROSIDING_Image Encryption Technique Based on Pixel Exchange and XOR Operation.pdf | 1.94 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.