Image encryption using vigenere cipher with bit circular shift

  • Authors

    • Arief Susanto
    • Tutik Khotimah
    • Muhammad Taufik Sumadi
    • Joko Warsito
    • Rihartanto .
    2018-03-05
    https://doi.org/10.14419/ijet.v7i2.2.12734
  • Vigenere chipper, bit circular shift, image encryption.
  • Cryptography is a method of securing text data, images and sound in order to secure its confidentiality and to minimize data stealing, attack, etc. The purpose of this study is to improve classic Vigenere cipher using bit circular shift on image encryption. This experiment uses both RGB and grayscale images as samples and shows that Vigenere cipher with bit circular shift has better performance when encrypting an image both visually and its randomness. It is obtained the MAE values of images of final encryption process are 81.702637 of RGB and 73.678756 of grayscale, and the final decryption process of 0 for both images. The randomness of images of the final encryption process is shown by its correlation coefficient values; it is 0.033857 of RGB and -0.058501 of grayscale.

     

  • References

    1. [1] H. Delfs, K. Paterson, and R. Cramer, Introduction to Cryptography: Principles and Application, Third Edit. Berlin: Springer-Verlag GmnH, 2015.

      [2] B. Schneier, Applied Cryptography, 20th Anniv. Indianapolis: John Wiley & Sons, Inc, 2015.

      [3] C. Paar and J. Pelzl, Understanding Cryptography. 2010.

      [4] R. Dixit and K. Ravindranath, “Encryption techniques & access control models for data security : A survey,†Int. J. Eng. Technol., vol. 7, no. 1.5, pp. 107–110, 2018.

      [5] A. Saraswat, C. Khatri, P. Thakral, and P. Biswas, “An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication,†Procedia - Procedia Comput. Sci., vol. 92, pp. 355–360, 2016.

      [6] M. Sajid, Q. Khizrai, and P. S. T. Bodkhe, “Image Encryption using Different Techniques for High-Security Transmission over a Network,†Int. J. Eng. Res. Gen. Sci., vol. 2, no. 4, pp. 299–306, 2014.

      [7] T. Kumar and K. Verma, “A Theory Based on Conversion of RGB image to Gray image,†Int. J. Comput. Appl., vol. 7, no. 2, pp. 5–12, 2010.

      [8] K. Loukhaoukha, J. Chouinard, and A. Berdai, “A Secure Image Encryption Algorithm Based on Rubik ’ s Cube Principle,†J. Electron. Comput. Eng., vol. 2012, 2012.

      [9] E. Setyaningsih, C. Iswahyudi, and N. Widyastuti, “Image Encryption on Mobile Phone using Super Encryption Algorithm,†Telkomnika, vol. 10, no. 4, pp. 835–843, 2012.

      [10] N. Sinha, “Improving Security of Vigenère Cipher by Double Columnar Transposition,†Int. J. Comput. Appl., vol. 100, no. 14, pp. 6–10, 2014.

      [11] A. Jawahir and H. Haviluddin, "An audio encryption using transposition method," International Journal of Advances in Intelligent Informatics, vol. 1, No 2, July 2015, pp. 98-106, 2015.

  • Downloads

  • How to Cite

    Susanto, A., Khotimah, T., Taufik Sumadi, M., Warsito, J., & ., R. (2018). Image encryption using vigenere cipher with bit circular shift. International Journal of Engineering & Technology, 7(2.2), 62-64. https://doi.org/10.14419/ijet.v7i2.2.12734