Abstract

Image is an object that has been used by various people since long ago. Utilization of these images evolve in line with advances in technology. Image in this information technology era is not only in a physical form, there is also a form of so-called digital image. Many people use digital images for personal use, so prone to be manipulated by others. Cryptographic technique, such as Caesar Cipher and OTP is a security techniques that can be applied to the digital image to avoid manipulation or theft of data image. The result is, an image can be read only by the sender and the recipient's image alone. Combined the two algorithms have fast turnaround time, up to 0.017791 seconds for the image to the size of 512x341 and 0.032302 seconds for the image to the size of 768x512. In addition, the resulting image has a very low degree of similarity, with the highest PSNR value obtained is 6.8653 dB. It can be concluded that the combined algorithm and OTP Caesar Cipher algorithm is fast and difficult to solve.

Highlights

  • Image or image is an object that has been used by the public for a long time

  • Based on the results of tests that have been done, it has been proved that the highest MSE value is 6377,582 with 768x512 image size, while the value of MSE decrypted on all images is 0

  • This indicates that the decryption process goes well

Read more

Summary

Introduction

Image or image is an object that has been used by the public for a long time. Not everyone is always associated with the image activity, because its use is limited to certain activities such as painting, reading a picture book, and shooting with a film camera so that the image is rarely used. The changing times that happened to enter the 21st century, the era of information technology has created a world [1]. From this virtual world, the use of digital images increasingly widespread and easy to use even by ordinary people though. Of the various activities in the virtual world, one of which is often done is to send digital images

Objectives
Methods
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.