Visual Cryptography with RSA Algorithm for Color Image

  • Authors

    • Ratnadewi .
    • Benny Santoso Sugiharto
    • Nuning Kurniasih
    • Dahlan Abdullah
    • Ida Bagus Ary Indra Iswara
    • Darmawan Napitupulu
    • Selfianus Laritmas
    • Erland Mouw
    • Ansari Saleh Ahmar
    • Nanik Kurniawati
    • Robbi Rahim
    2018-03-10
    https://doi.org/10.14419/ijet.v7i2.5.13953
  • Decryption, Encryption, RSA Algorithm, Visual Cryptography.
  • RSA algorithm founded by Rivest, Shamir and Adleman is an algorithm that based on the use of factorization of a significant number to its factor, and the element must be the prime number. Factorization used to find the private key. In this paper, the RSA algorithm will be used in a visual cryptographic to encrypt and decrypt a color image. The test will conduct with five different photos. Assessment performed using Structural similarity (SSIM) to compare the matrix value of the initial image with the decrypted image. SSIM generates a value of 1 on all pictures. The proves that the Matrix Value in the initial and after decoded images has the same amount. The image decryption will worsen; can be seen from the smaller SSIM value. 

     

     

  • References

    1. [1] D. Abdullah, S. Suwilo, Tulus, H. Mawengkang, and S. Efendi, “Data envelopment analysis with upper bound on output to measure efficiency performance of departments in Malaikulsaleh University,†J. Phys. Conf. Ser., vol. 890, no. 1, p. 012102, Sep. 2017.

      [2] D. Abdullah et al., “A Slack-Based Measures for Improving the Efficiency Performance of Departments in Universitas Malikussaleh,†Int. J. Eng. Technol., vol. 7, no. 2, pp. 491–494, Apr. 2018.

      [3] H. Hartono, D. Abdullah, and A. S. Ahmar, “A New Diversity Technique for Imbalance Learning Ensembles,†Int. J. Eng. Technol., vol. 7, no. 2, pp. 478–483, Apr. 2018.

      [4] A. Putera, U. Siahaan, and R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,†Int. J. Secur. Its Appl., vol. 10, no. 8, pp. 173–180, Aug. 2016.

      [5] R. Rahim, “Man-in-the-middle-attack prevention using interlock protocol method,†ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp. 6483–6487, 2017.

      [6] R. Rahim et al., “Combination Base64 Algorithm and EOF Technique for Steganography,†J. Phys. Conf. Ser., vol. 1007, no. 1, p. 012003, Apr. 2018.

      [7] R. Rahim, N. Kurniasih, M. Mustamam, L. Andriany, U. Nasution, and A. H. Mu-, “Combination Vigenere Cipher and One Time Pad for Data Security,†Int. J. Eng. Technol., vol. 7, no. 2.3, pp. 92–94, 2018.

      [8] D. Abdullah, Tulus, S. Suwilo, S. Effendi, and Hartono, “DEA Optimization with Neural Network in Benchmarking Process,†IOP Conf. Ser. Mater. Sci. Eng., vol. 288, no. 1, p. 012041, Jan. 2018.

      [9] H. Nurdiyanto and R. Rahim, “Enhanced pixel value differencing steganography with government standard algorithm,†in 2017 3rd International Conference on Science in Information Technology (ICSITech), 2017, pp. 366–371.

      [10] H. Nurdiyanto, R. Rahim, and N. Wulan, “Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement,†J. Phys. Conf. Ser., vol. 930, no. 1, p. 012005, Dec. 2017.

      [11] M. Blumenthal, “Encryption: Strengths and Weaknesses of Public-key Cryptography,†CSRS 2007, pp. 1–7, 2007.

      [12] A. E. S. Kacaribu and Ratnadewi, “Multiplying cipher images on visual cryptography with ElGamal algorithm,†in 2015 2nd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), 2015, pp. 159–162.

      [13] F. Liu and C. Wu, “Embedded Extended Visual Cryptography Schemes,†vol. 2, no. 2, pp. 30–37, 2010.

      [14] E. Kartikadarma, T. Listyorini, and R. Rahim, “An Android mobile RC4 simulation for education,†World Trans. Eng. Technol. Educ., vol. 16, no. 1, pp. 75–79, 2018.

      [15] R. Rahim, M. Dahria, M. Syahril, and B. Anwar, “Combination of the Blowfish and Lempel-Ziv-Welch algorithms for text compression,†World Trans. Eng. Technol. Educ., vol. 15, no. 3, pp. 292–297, 2017.

      [16] R. Ratnadewi and P. K. Sari, “ComTech,†Comput. Math. Eng. Apllications, vol. 7, no. 3, pp. 213–223, 2016.

      [17] A. P. Utama Siahaan, “RC4 Technique in Visual Cryptography RGB Image Encryption,†Int. J. Comput. Sci. Eng., vol. 3, no. 7, pp. 1–6, Jul. 2016.

      [18] Q. Kester, “A Visual Cryptographic Encryption Technique for Securing Medical Images,†arXiv Prepr. arXiv1307.7791, vol. 3, no. 6, pp. 3–7, 2013.

      [19] M. A. M. Maeref, F. Alghali, and K. Abied, “An Advance Visual Model for Animating Behavior of Cryptographic Protocols,†J. Comput., vol. 10, no. 5, pp. 336–346, 2015.

      [20] R. I. Al-Khalid, R. A. Al-Dallah, A. M. Al-Anani, R. M. Barham, and S. I. Hajir, “A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes,†J. Softw. Eng. Appl., vol. 10, no. 01, pp. 1–10, Jan. 2017.

      [21] M. Naor and A. Shamir, “Visual Cryptography,†in Proc. Adv. Cryptol.: Eurprocrypt’94, LNCS, 1994, vol. 950, pp. 1–12., 1994, pp. 1–12.

      [22] G. Singh and Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security,†Int. J. Comput. Appl., vol. 6, no. 19, pp. 33–38, 2013.

      [23] T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,†IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469–472, 1985.

      [24] T. Cao, D. Lin, and R. Xue, “A randomized RSA-based partially blind signature scheme for electronic cash,†Comput. Secur., vol. 24, no. 1, pp. 44–49, Feb. 2005.

      [25] S. Garg and M. K. Rana, “A Review on RSA Encryption Algorithm,†Int. J. Eng. Comput. Sci., vol. 5, no. 7, pp. 17148–17151, 2016.

      [26] S. Bruce, Applied cryptography. 1996.

      [27] B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition,†Network. pp. 623–631, 1996.

      [28] D. Chandravathi and P. V. Lakshmi, “Advanced Homomorphic Encryption for Cloud Data Security,†JOIV Int. J. Informatics Vis., vol. 1, no. 4, p. 1, Mar. 2017.

      [29] M. Ramalingam and N. A. M. Isa, “A steganography approach over video images to improve security,†Indian J. Sci. Technol., vol. 8, no. 1, pp. 79–86, 2015.

      [30] H. Delfs and H. Knebl, Information Security and Cryptography, vol. 19. 2007.

  • Downloads

  • How to Cite

    ., R., Santoso Sugiharto, B., Kurniasih, N., Abdullah, D., Bagus Ary Indra Iswara, I., Napitupulu, D., Laritmas, S., Mouw, E., Saleh Ahmar, A., Kurniawati, N., & Rahim, R. (2018). Visual Cryptography with RSA Algorithm for Color Image. International Journal of Engineering & Technology, 7(2.5), 65-68. https://doi.org/10.14419/ijet.v7i2.5.13953