Implementasi Algoritma RC4A Dalam Pengamanan Citra Digital
Abstract
Digital images that are private and confidential are very vulnerable to wiretapping by irresponsible parties, especially if the images are distributed via the internet. The act of theft and abuse of secret images of course can harm the image owner. One of the techniques to reduce the above problems is by using cryptographic techniques. Cryptographic techniques can secure images by means of digital image encryption by implementing the RC4A algorithm then using the initial keyword as input in the process carried out to generate new, more random keywords, based on the Key Schedule Algorithm. (KSA) and pseudo random generation algorithm (PRGA). To determine the comparison between the original image (PlainImage) and the original image (CipherImage), processing was carried out with MeanSquareError (MSE) and PeakSiqnalToNoiseRation (PSNR). The results of this study were digital images encrypted with the RC4A algorithm in terms of time differences and image results after encryption where the time used to encrypt is shorter than the description and the image results before encryption are not the same after encryption.
References
F. Kurniadi, Irwansyah et al., “Analisa algoritma kriptografi rc4 pada enkripsi citra digital,” J. Ilm. R B, vol. 10, no. 12, hal. 1–7, 2014, [Daring]. Tersedia pada: http://jurnal.unived.ac.id/index.php/jmi/article/download/226/203%5Cnhttp://mfile.narotama.ac.id/files/Zakki Falani/Magang PDF/04104008 SITI MARIAM.pdf%5Cnhttp://library.umn.ac.id/jurnal/public/uploads/papers/pdf/ce8a2e6ffbf47103cfb493d743d173d3.pdf.
T. Zebua dan E. Ndruru, “Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4,” J. Teknol. Inf. dan Ilmu Komput., vol. 4, no. 4, hal. 275, 2017, doi: 10.25126/jtiik.201744474.
D. R. Saragi, J. M. Gultom, J. A. Tampubolon, dan I. Gunawan, “Pengamanan Data File Teks (Word) Menggunakan Algoritma RC4,” J. Sist. Komput. dan Inform., vol. 1, no. 2, hal. 114, 2020, doi: 10.30865/json.v1i2.1745.
A. M. Hasibuan, “Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES Pada Smartphone,” MEANS (Media Inf. Anal. dan Sist., vol. 2, no. 1, hal. 29–35, 2017, doi: 10.17605/JMEANS.V2I1.20.
I. Pendahuluan dan A. A. M. Hellman, “Perancangan Aplikasi Keamanan Data Teks,” vol. 16, hal. 302–305, 2017.
N. Hayati, “Implementasi Algoritma RC4A dan MD5 untuk Menjamin Confidentiality dan Integrity pada File Teks,” J. Penelit. Tek. Inform., vol. 1, no. April, hal. 51–57, 2017.
M. K. Sri Ratna Sulistiyanti, FX Arinto Setyawan, “Pengolahan Citra Dasar dan Contoh Penerapannya,” עלון הנוטע, vol. 66, hal. 37–39, 2012.
D. Putra, “Pengolahan Citra Digital,” in Pengolahan Citra Digital, Westrining., Yogyakarta: CV.Andi Offset, 2010, hal. 38–39.
K. Margi S dan S. Pendawa W, “Analisa Dan Penerapan Metode Single Exponential Smoothing Untuk Prediksi Penjualan Pada Periode Tertentu,” Pros. SNATIF, no. 1998, hal. 259–266, 2015.
S. Santoso dan R. Nurmalina, “Perencanaan dan Pengembangan Aplikasi Absensi Mahasiswa Menggunakan Smart Card Guna Pengembangan Kampus Cerdas (Studi Kasus Politeknik Negeri Tanah Laut),” J. Integr., vol. 9, no. 1, hal. 84–91, 2017.
A. R. Darlis, P. Trisapto, dan L. Jambola, “Perancangan Dan Realisasi Sistem Pentransmisian Short Message Dan Sinyal Digital Pada Modulator Demodulator ( Modem ) Binary Phase Shift Keying ( BPSK) Berbasis Matlab 7.4.,” J. Rekayasa, vol. 17, no. 1, hal. 1–12, 2013.
A. J. Nathan dan A. Scobell, “How China sees America,” Foreign Affairs, vol. 91, no. 5. hal. 1689–1699, 2012, doi: 10.1017/CBO9781107415324.004.
B. Data, “Rancang Bangun Aplikasi Toko Menggunakan Visual Basic 9.0 €Œstudi Kasus Roberta Superstoreâ€,” J. Tek. Elektro dan Komput., vol. 1, no. 2, hal. 1–7, 2012, doi: 10.35793/jtek.1.2.2012.601.
Copyright (c) 2022 Yanti Nur Iman Giawa

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


