Sistem Kriptografi Citra Digital Pada Jaringan Intranet Menggunakan Metode Kombinasi Chaos Map Dan Teknik Selektif

  • Arinten Dewi Hidayat Universitas Komputer Indonesia (UNIKOM)
  • Irawan Afrianto Universitas Komputer Indonesia (UNIKOM)

Abstract

Many organizations use design applications to draw the products they create. The drawings are digital files that have various formats of type and size. The images sometimes have to be protected because they are secret designs, such as the design of military vehicles, weapons and other designs. In order to secure digital data, cryptography is one of the solution, including if the data to be secured in the form of digital images. Algorithms that can be used to perform cryptography in digital image one of them is chaos map using Arnold cat map, logistics map and application of selective technique. Chaos was chosen for three reasons: sensitivity to initial conditions, random behavior, and no repetitive periods. While the application of selective technique means only encrypt some elements in the image but the effect of the whole image is encrypted. Cryptography in the image is also implemented because the organization using an intranet network to deliver its design drawings from one division to another. This allows for data tapping or exploitation of digital images while inside the intranet network. So it is necessary to develop a cryptographic system on the intranet network that has the ability to secure digital images that are in the network. The results obtained from black box testing, white box and network security testing show that the built system has been able to secure digital images when sent over the organization's intranet network.

Index Terms—Cryptography, Image, Chaos Map Algorithm, Selective Technique, Intranet.

Downloads

Download data is not yet available.
Published
2017-04-27
How to Cite
Hidayat, A., & Afrianto, I. (2017). Sistem Kriptografi Citra Digital Pada Jaringan Intranet Menggunakan Metode Kombinasi Chaos Map Dan Teknik Selektif. Ultimatics : Jurnal Teknik Informatika, 9(1), 59-66. https://doi.org/https://doi.org/10.31937/ti.v9i1.565