• Login
    View Item 
    •   Home
    • LECTURER SCIENTIFIC PUBLICATION (Publikasi Ilmiah)
    • LSP-Conference Proceeding
    • View Item
    •   Home
    • LECTURER SCIENTIFIC PUBLICATION (Publikasi Ilmiah)
    • LSP-Conference Proceeding
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Image Encryption Technique Based on Pixel Exchange and XOR Operation

    Thumbnail
    View/Open
    F MIPA_PROSIDING_Image Encryption Technique Based on Pixel Exchange and XOR Operation.pdf (1.892Mb)
    Date
    2017-08-08
    Author
    SANTOSO, Kiswara Agung
    FATMAWATI, Fatmawati
    SUPRAJITNO, Herry
    Metadata
    Show full item record
    Abstract
    Recently the information system develops quickly, especially information system via internet. It’s happened because the Internet can be used by anyone, anywhere and anytime. The information on the Internet has various types of data such as text, video, audio, and image/photo. Although we can access the Internet easily, but the data which transfered through internet isn’t safe. It caused by hacker, someone who manipulate information so that data become different with the original. Many efforts have been done to make the data that transmitted over the Internet to be secure, for example make the coding, disguise or hide data into other media. In this paper we intend to present the results of research about image encryption techniques to increase the security of data (image) so that safe if the data is transfered via the internet. This encryption using symmetric-key. The key is 4 BIT or a real number between 0 15. This key will be processed by each pixel in the image using XOR operation. The next step the BIT of pixels are devided into two part, LSB (least significant bit) and MSB (Most significant bit). Both will be exchanged if the conditions have completed. We do that to get better results, that is file size of the image encryption is smaller than the original image. The results of this research are image encryption have significant differences with the original image, it can be proved by correlation between both images. Another advantage of this coding technique is the image encryption file size smaller than the original image file size so it can speed up of image transfer. Decode result of this coding technique is good enough, it can be seen from the mean square error (MSE) between the image encryption that has been restored to its original form and the original image. All the manufacturing process of encoding techniques have been simulated and analyzed using software MATLAB 2012a.
    URI
    https://repository.unej.ac.id/xmlui/handle/123456789/111249
    Collections

    UPA-TIK Copyright © 2024  Library University of Jember
    Contact Us | Send Feedback

    Indonesia DSpace Group :

    University of Jember Repository
    IPB University Scientific Repository
    UIN Syarif Hidayatullah Institutional Repository
     

     

    Browse

    All of RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    UPA-TIK Copyright © 2024  Library University of Jember
    Contact Us | Send Feedback

    Indonesia DSpace Group :

    University of Jember Repository
    IPB University Scientific Repository
    UIN Syarif Hidayatullah Institutional Repository