Implementasi Algoritma RC4A Dalam Pengamanan Citra Digital

  • Yanti Nur Iman Giawa * Mail Universitas Budi Darma, Medan, Indonesia
Keywords: RC4A Algorithm; Cryptography; PlainImage; Encryption

Abstract

Digital images that are private and confidential are very vulnerable to wiretapping by irresponsible parties, especially if the images are distributed via the internet. The act of theft and abuse of secret images of course can harm the image owner. One of the techniques to reduce the above problems is by using cryptographic techniques. Cryptographic techniques can secure images by means of digital image encryption by implementing the RC4A algorithm then using the initial keyword as input in the process carried out to generate new, more random keywords, based on the Key Schedule Algorithm. (KSA) and pseudo random generation algorithm (PRGA). To determine the comparison between the original image (PlainImage) and the original image (CipherImage), processing was carried out with MeanSquareError (MSE) and PeakSiqnalToNoiseRation (PSNR). The results of this study were digital images encrypted with the RC4A algorithm in terms of time differences and image results after encryption where the time used to encrypt is shorter than the description and the image results before encryption are not the same after encryption.

References

F. Kurniadi, Irwansyah et al., “Analisa algoritma kriptografi rc4 pada enkripsi citra digital,” J. Ilm. R B, vol. 10, no. 12, hal. 1–7, 2014, [Daring]. Tersedia pada: http://jurnal.unived.ac.id/index.php/jmi/article/download/226/203%5Cnhttp://mfile.narotama.ac.id/files/Zakki Falani/Magang PDF/04104008 SITI MARIAM.pdf%5Cnhttp://library.umn.ac.id/jurnal/public/uploads/papers/pdf/ce8a2e6ffbf47103cfb493d743d173d3.pdf.

T. Zebua dan E. Ndruru, “Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4,” J. Teknol. Inf. dan Ilmu Komput., vol. 4, no. 4, hal. 275, 2017, doi: 10.25126/jtiik.201744474.

D. R. Saragi, J. M. Gultom, J. A. Tampubolon, dan I. Gunawan, “Pengamanan Data File Teks (Word) Menggunakan Algoritma RC4,” J. Sist. Komput. dan Inform., vol. 1, no. 2, hal. 114, 2020, doi: 10.30865/json.v1i2.1745.

A. M. Hasibuan, “Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES Pada Smartphone,” MEANS (Media Inf. Anal. dan Sist., vol. 2, no. 1, hal. 29–35, 2017, doi: 10.17605/JMEANS.V2I1.20.

I. Pendahuluan dan A. A. M. Hellman, “Perancangan Aplikasi Keamanan Data Teks,” vol. 16, hal. 302–305, 2017.

N. Hayati, “Implementasi Algoritma RC4A dan MD5 untuk Menjamin Confidentiality dan Integrity pada File Teks,” J. Penelit. Tek. Inform., vol. 1, no. April, hal. 51–57, 2017.

M. K. Sri Ratna Sulistiyanti, FX Arinto Setyawan, “Pengolahan Citra Dasar dan Contoh Penerapannya,” עלון הנוטע, vol. 66, hal. 37–39, 2012.

D. Putra, “Pengolahan Citra Digital,” in Pengolahan Citra Digital, Westrining., Yogyakarta: CV.Andi Offset, 2010, hal. 38–39.

K. Margi S dan S. Pendawa W, “Analisa Dan Penerapan Metode Single Exponential Smoothing Untuk Prediksi Penjualan Pada Periode Tertentu,” Pros. SNATIF, no. 1998, hal. 259–266, 2015.

S. Santoso dan R. Nurmalina, “Perencanaan dan Pengembangan Aplikasi Absensi Mahasiswa Menggunakan Smart Card Guna Pengembangan Kampus Cerdas (Studi Kasus Politeknik Negeri Tanah Laut),” J. Integr., vol. 9, no. 1, hal. 84–91, 2017.

A. R. Darlis, P. Trisapto, dan L. Jambola, “Perancangan Dan Realisasi Sistem Pentransmisian Short Message Dan Sinyal Digital Pada Modulator Demodulator ( Modem ) Binary Phase Shift Keying ( BPSK) Berbasis Matlab 7.4.,” J. Rekayasa, vol. 17, no. 1, hal. 1–12, 2013.

A. J. Nathan dan A. Scobell, “How China sees America,” Foreign Affairs, vol. 91, no. 5. hal. 1689–1699, 2012, doi: 10.1017/CBO9781107415324.004.

B. Data, “Rancang Bangun Aplikasi Toko Menggunakan Visual Basic 9.0 €Œstudi Kasus Roberta Superstoreâ€,” J. Tek. Elektro dan Komput., vol. 1, no. 2, hal. 1–7, 2012, doi: 10.35793/jtek.1.2.2012.601.

Dimensions Badge
Published
2022-11-30
Section
Articles