Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher
DOI:
https://doi.org/10.14421/jiska.2022.7.1.33-45Keywords:
digital image encryption, vigenere cipher, classical cryptography, base64 encoding, data securityAbstract
Cryptography is one of the most popular methods in data security by making data very difficult to read or even unreadable. One of the well-known techniques or algorithms in cryptography is Vigenere Cipher. This classic algorithm is classified as a polyalphabetic substitution cipher-based algorithm. Therefore, this algorithm tends to only handle data in text form. By this research, a console-based application has been developed which is made from PHP programming language to be able to encrypt and decrypt digital image media using Vigenere Cipher. The encryption process is done by first converting a digital image into a base64 encoding format so that the encryption process can be carried out using the tabula recta containing the radix-64 letter arrangement used for base64 encoding. Conversely, the decryption process is carried out by restoring the encrypted file using radix-64 letters, so we get the image file in the base64 encoding format. Then, the image with the base64 encoding format is decoded into the original file. The encryption process took less than 0,2 seconds and 0.19 seconds for the decryption process and 33.34% for average file size addition on the encrypted file from the original file size. Testing on ten different images with different sizes and dimensions showed a 100% success rate which means this research was successfully carried out.
References
Anwar, F., Rachmawanto, E. H., Atika Sari, C., & Ignatius Moses Setiadi, D. R. (2019). StegoCrypt Scheme using LSB-AES Base64. 2019 International Conference on Information and Communications Technology (ICOIACT), July, 85–90. https://doi.org/10.1109/ICOIACT46704.2019.8938567
Ariyus, D. (2006). Kriptografi: Keamanan Data dan Komunikasi. Graha Ilmu.
Awad, M., Ali, M., Takruri, M., & Ismail, S. (2019). Security vulnerabilities related to web-based data. TELKOMNIKA (Telecommunication Computing Electronics and Control), 17(2), 852. https://doi.org/10.12928/telkomnika.v17i2.10484
Fadlil, A., Riadi, I., & Nugrahantoro, A. (2020a). Kombinasi Sinkronisasi Jaringan Syaraf Tiruan dan Vigenere Cipher untuk Optimasi Keamanan Informasi. Digital Zone: Jurnal Teknologi Informasi Dan Komunikasi, 11(1), 81–95. https://doi.org/10.31849/digitalzone.v11i1.3945
Fadlil, A., Riadi, I., & Nugrahantoro, A. (2020b). Data Security for School Service Top-Up Transactions Based on AES Combination Blockchain Technology. Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, 11(3), 155. https://doi.org/10.24843/LKJITI.2020.v11.i03.p04
Gerhana, Y. A., Insanudin, E., Syarifudin, U., & Zulmi, M. R. (2016). Design of digital image application using vigenere cipher algorithm. 2016 4th International Conference on Cyber and IT Service Management, 1–5. https://doi.org/10.1109/CITSM.2016.7577571
Gunadhi, E., & Sudrajat, A. (2017). Pengamanan Data Rekam Medis Pasien Menggunakan Kriptografi Vigènere Cipher. Jurnal Algoritma, 13(2), 295–301. https://doi.org/10.33364/algoritma/v.13-2.295
Hermansa, Umar, R., & Yudhana, A. (2019). Analisis Sistem Keamanan Teknik Kriptografi dan Steganografi Pada Citra Digital (Bitmap). Seminar Nasional Teknologi Fakultas Teknik Universitas Krisnadwipayana, 520–528.
Hernawandra, P., Supriyadi, S., & Lenggana, U. T. (2018). Aplikasi Steganografi Menggunakan LSB 4 Bit Sisipan dengan Kombinasi Algoritme Substitusi dan Vigenere Berbasis Android. Jurnal Teknologi Dan Sistem Komputer, 6(2), 44–50. https://doi.org/10.14710/jtsiskom.6.2.2018.44-50
Mandal, S. K., & Deepti, A. R. (2016). A Cryptosystem Based On Vigenere Cipher By Using Mulitlevel Encryption Scheme. International Journal of Computer Science and Information Technologies, 7(4), 2096–2099.
Maruf, F., Riadi, I., & Prayudi, Y. (2015). Merging of Vigenére Cipher with XTEA Block Cipher to Encryption Digital Documents. International Journal of Computer Applications, 132(1), 27–33. https://doi.org/10.5120/ijca2015907262
Munir, R. (2006). Kriptografi. Informatika.
Nasution, S. D., Ginting, G. L., Syahrizal, M., & Rahim, R. (2017). Data Security Using Vigenere Cipher and Goldbach Codes Algorithm. International Journal of Engineering Research & Technology (IJERT), 6(1), 360–363.
Prabowo, H. E., & Hangga, A. (2015). Enkripsi Data Berupa Teks Menggunakan Metode Modifikasi Vigenere Cipher. Seminar Nasional Aplikasi Teknologi Informasi (SNATi), 1–4.
Rachmawanto, E. H., Irawan, C., Studi, P., Informatika, T., Komputer, F. I., Dian, U., Semarang, N., & Digital, C. (2019). Enkripsi Dan Dekripsi Citra RGB Menggunakan Algoritma Arnold’s Cat Map. Prosceeding SENDI_U, 44–49.
Riadi, I., Yudhana, A., & W, Y. (2020). Analisis Keamanan Website Open Journal System Menggunakan Metode Vulnerability Assessment. Jurnal Teknologi Informasi Dan Ilmu Komputer, 7(4), 853. https://doi.org/10.25126/jtiik.2020701928
Rihartanto, R., Ningsih, R. K., Gaffar, A. F. O., & Utomo, D. S. B. (2020). Implementation of vigenere cipher 128 and square rotation in securing text messages. Jurnal Teknologi Dan Sistem Komputer, 8(3), 201–209. https://doi.org/10.14710/jtsiskom.2020.13476
Rizal, D., Sutojo, T., & Rahayu, Y. (2016). Implementasi Kriptografi Gambar Menggunakan Kombinasi Algoritma Elgamal Dan Mode Operasi ECB (Electronic Code Book). Techno.COM, 15(3), 231–240. https://doi.org/10.33633/tc.v15i3.1240
Rojali, Salman, A. G., & George. (2017). Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods. International Conference on Mathematics: Pure, Applied and Computation, 020059. https://doi.org/10.1063/1.4994462
Saputra, I., Hasibuan, N. A., Aan, M., & Rahim, R. (2017). Vigenere Cipher Algorithm with Grayscale Image Key Generator for Secure Text File. International Journal of Engineering Research & Technology (IJERT), 6(1), 266–269.
Setiadi, D. R. I. M., Jatmoko, C., Rachmawanto, E. H., & Sari, C. A. (2018). Kombinasi Cipher Subtitusi (Beaufort Dan Vigenere) pada Citra Digital. Prosceeding SENDI_U, 52–57.
Sinaga, D., Umam, C., Setiadi, D. R. I. M., & Rachmawanto, E. H. (2018). Teknik Super Enkripsi Menggunakan Transposisi Kolom Berbasis Vigenere Cipher Pada Citra Digital. Dinamika Rekayasa, 14(1), 57. https://doi.org/10.20884/1.dr.2018.14.1.198
Soofi, A. A., Riaz, I., & Rasheed, U. (2016). An Enhanced Vigenere Cipher For Data Security. International Journal of Scientific & Technology Research, 5(03), 141–145.
Subandi, A., Lydia, M. S., Sembiring, R. W., Zarlis, M., & Efendi, S. (2018). Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process. IOP Conference Series: Materials Science and Engineering, 420, 012119. https://doi.org/10.1088/1757-899X/420/1/012119
Sumartono, I., Siahaan, A. P. U., & Arpan. (2016). Base64 Character Encoding and Decoding Modeling. International Journal of Recent Trends in Engineering & Research (IJRTER), 02(12), 63–68. https://doi.org/10.31227/osf.io/ndzqp
Wen, S., & Dang, W. (2018). Research on Base64 Encoding Algorithm and PHP Implementation. 2018 26th International Conference on Geoinformatics, 1–5. https://doi.org/10.1109/GEOINFORMATICS.2018.8557068
Yunita, S., Hasan, P., & Ariyus, D. (2019). Modifikasi Algoritma Hill Chiper dan Twofish Menggunakan Kode Wilayah Telepon. SISFOTENIKA, 9(2), 213. https://doi.org/10.30700/jst.v9i2.489
Zebua, T., & Ndruru, E. (2017). Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4. Jurnal Teknologi Informasi Dan Ilmu Komputer, 4(4), 275–282. https://doi.org/10.25126/jtiik.201744474
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Imam Riadi, Abdul Fadlil, Fahmi Auliya Tsani

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms as stated in http://creativecommons.org/licenses/by-nc/4.0
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.