Image Encryption on Mobile Phone using Super Encryption Algorithm

Emy Setyaningsih, Catur Iswahyudi, Naniek Widyastuti

Abstract


Mobile phones have limited memory and computational resources. Modern encryption algorithms such as DES, AES, IDEA uses a complicated and complex algorithm, that are not suitable for image encryption on mobile phones. Necessary, it is tradeoff between speed, security, and flexibility. Problem to be investigated and resolved is how to get the image encryption algorithm which is simple yet safe, with the lightweight and efficient computing. The algorithm developed in this study was super-encryption algorithm that combines Playfair cipher and the Vigenere cipher. The experimental results show the cipher image histogram has a distribution of diversity and a significant difference to the plain image histogram, and frequency of occurrence of each intensity value in the histogram of cipher image is also uneven, which means can not provide clues to do statistical attack. The experimental results also showed a correlation between the elements of the image after encryption has decreased significantly. The average of quality encryption showed that the rate of change of image pixels is high enough so that cipher image difficult to identify. Tests on a cell phone showed that this algorithm requires only small computational resources. This shows that the algorithm is quite effective for image encryption on mobile phones.

Full Text:

PDF

References


Gupta K, Silakari S. Choase Based Image Encryption Using Block-Based Transformation Algorithm. International Journal of Computer and Network Security. 2009

Jolfaei A, Mirghadri A. Image Encryption Using Chaos and Block Cipher. Computer and Information Science. 2011.

Abrihama D. Keystream Vigenere Cipher: Modifikasi Vigenere Cipher dengan Pendekatan Keystream Generator. Program Studi Informatika ITB. Bandung. 2008

Ismail I A, Mohammed A, Hossam D. How To Repair The Hill Cipher. Journal of Zhejiang University SCIENSE A. http://www.zju.edu.cn/jzus. 2006.

Krikor L, Baba S, Arif T, Shaaban Z. Image Encryption Using DCT and Stream Cipher. European Journal of Scientific Research. http://www.eurojournals.com/ejsr.htm. 2009: 47-57.

Setyaningsih E. Penyandian Citra Menggunakan Metode Playfair Cipher. Jurnal Ilmiah Nasional Jurnal Teknologi. 2009; 2(2): 213-217.

Setyaningsih E. Konsep Superenkripsi Untuk Penyandian Citra Warna Menggunakan Kombinasi Hill Cipher dan Playfair Cipher. Jurnal Ilmiah Nasional SITRORIKA. 2010: 38-48.

Suhartana I K G. Pengamanan Image True Color 24 Bit Menggunakan Algoritma Vigenere Cipher Dengan Penggunaan Kunci Bersama. Ejurnal. Universitas Udayana Bali. 2008.

Younes M A B , Jantan A. Image Encryption Using Block-Based Transformation Algorithm. IAENG International Journal of Computer Science. 2008.

Sun J., Wang Y., Wu X., Zhang X., Gao H. A New Image Segmentation Algorithm and It’s Application in lettuce object segmentation. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2012; 10(3).

Akram U. Retinal Image Preprocessing: Background and Noise Segmentation. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2012; 10(3).

Feng W., Bao W. An Improved Technology of Remote Sensing Image Fusion Based Waveled Packet and Pulse Coupled Neural Net. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2012; 10(3).

Stinson R Douglas. Cryptography Theory and Practice, London: CRC Press. Inc.1995




DOI: http://dx.doi.org/10.12928/telkomnika.v10i4.871

Refbacks

  • There are currently no refbacks.


Copyright (c) 2014 Universitas Ahmad Dahlan

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.


TELKOMNIKA Telecommunication, Computing, Electronics and Control
website: http://telkomnika.ee.uad.ac.id
online system: http://journal.uad.ac.id/index.php/TELKOMNIKA
Phone: +62 (274) 563515, 511830, 379418, 371120 ext: 3208
Fax    : +62 (274) 564604

View TELKOMNIKA Stats