Implementation of The Advanced Encryption Standard (AES) Algorithm for Digital Image Security

Angga Aditya Permana, Luigi Ajeng Pratiwi

Abstract


Nowadays, technological advances have made it increasingly easy to obtain information, especially image data (digital images). Digital image is an interesting thing to look for information. So that misuse of data can be done for personal or public interests. Misuse of data can be avoided by adding data security systems. Cryptography is the science of securing data. Cryptography can be done using the AES (Advanced Encryption Standard) algorithm, which is an algorithm that utilizes symmetric keys. Testing is done by entering the same key in the encryption and decryption process. Encryption is the process of encoding plaintext (original text) into ciphertext (text that has been encoded). While decryption is the process of recovering the plaintext from the ciphertext. Therefore, data security is an important thing to do. This study aims to find out how encryption and decryption on the AES algorithm can be used to secure digital data. The results of this study indicate that the encryption and decryption process on the AES algorithm was successfully carried out so that it can be used to secure data on digital images.


Keywords


Algorithm; Cryptography; AES; Digital Image; Encryption; Decryption

Full Text:

PDF

References


A. D. Hidayat and I. Afrianto, “Sistem Kriptografi Citra Digital Pada Jaringan Intranet Menggunakan Metode Kombinasi Chaos Map Dan Teknik Selektif,” J. Ultim., vol. 9, no. 1, pp. 59–66, 2017, doi: 10.31937/ti.v9i1.565.

Taronisokhizebua1, “Pengamanancitradigitalberdasarkan Modifikasialgoritmarc4,” vol. 4, no. 4, 2017, doi: 10.25126/jtiik.201744474.

N. M. S. Iswari, “Key generation algorithm design combination of RSA and ElGamal algorithm,” Proc. 2016 8th Int. Conf. Inf. Technol. Electr. Eng. Empower. Technol. Better Futur. ICITEE 2016, 2017, doi: 10.1109/ICITEED.2016.7863255.

Rinaldi Munir, “Pengenalan Kriptografi dan Steganografi untuk Keamanan Informasi,” Inst. Teknol. Bandung, p. 53.

A. Hidayatullah, Entik Insanudin, MT, “Pengenalan Kriptografi Dan Pemakaianya Sehari-Hari,” Kriptografi, no. May. pp. 1–7, 2016.

A. A. Permana, “Penerapan Kriptografi Pada Teks Pesan dengan Menggunakan Metode Vigenere Cipher Berbasis Android,” J. Al-AZHAR Indones. SERI SAINS DAN Teknol., vol. 4, no. 3, p. 110, 2018, doi: 10.36722/sst.v4i3.280.

D. Nurnaningsih and A. A. Permana, “Rancangan Aplikasi Pengamanan Data Dengan Algoritma Advanced Encyption Standard (Aes),” J. Tek. Inform., vol. 11, no. 2, pp. 177–186, 2018, doi: 10.15408/jti.v11i2.7811.

N. Sofian, A. Wicaksana, and S. Hansun, “LSB steganography and AES encryption for multiple PDF documents,” Proc. 2019 5th Int. Conf. New Media Stud. CONMEDIA 2019, pp. 100–105, 2019, doi: 10.1109/CONMEDIA46929.2019.8981842.

M. A. Amarullah, dan Andi Suprianto, and M. P. Enggineer Pamapersada Nusantara, “Penggunaan Algorithma AES-RIJNDAEL Pada Sistem Enkripsi Dan Dekripsi Untuk Komunikasi Data Implementasi of AES-Rijndael in Encrytion and Decryption System for Data Communication,” vol. 25, no. 2, pp. 31–39, 2015.

Henry, A. H. Kridalaksana, and Z. Arifin, “Kriptografi Aes Mode Cbc Pada Citra Digital Berbasis Android,” Semin. Ilmu Komput. dan Teknol. Inf., vol. 1, no. 1, pp. 45–52, 2016.




DOI: https://doi.org/10.15408/jti.v15i1.25735 Abstract - 0 PDF - 0

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Angga Aditya Permana, Luigi Ajeng Pratiwi

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

3rd Floor, Dept. of Informatics, Faculty of Science and Technology, UIN Syarif Hidayatullah Jakarta
Jl. Ir. H. Juanda No.95, Cempaka Putih, Ciputat Timur.
Kota Tangerang Selatan, Banten 15412
Tlp/Fax: +62 21 74019 25/ +62 749 3315
Handphone: +62 8128947537
E-mail: jurnal-ti@apps.uinjkt.ac.id


Creative Commons Licence
Jurnal Teknik Informatika by Prodi Teknik Informatika Universitas Islam Negeri Syarif Hidayatullah Jakarta is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Based on a work at http://journal.uinjkt.ac.id/index.php/ti.

JTI Visitor Counter: View JTI Stats

 Flag Counter