Implementasi Keamanan Citra Menggunakan Algoritma AES-128 Dengan Aplikasi Client-Server

A Azanuddin(1*), Suardi Yakub(2), Jaka Prayudha(3),

(1) STMIK Triguna Dharma
(2) STMIK Triguna Dharma
(3) STMIK Triguna Dharma
(*) Corresponding Author

Abstract


Digital images that are private and confidential are very vulnerable to eavesdropping by irresponsible parties. Especially when distributed over the internet, such as chat-based applications such as Facebook, WhatsApp and e-mail media. Image sent via the internet. Because digital images are still recognizable images and can be used by eavesdroppers for personal gain, to the detriment of those who have access to image data. The act of tapping the image data can be minimized by the application of cryptographic encryption techniques. This research will secure digital images with 128 bit AES method for encryption and decryption of digital images in client-server based applications. The results of the AES algorithm encryption produce a cipherimage with pixel values that are much different from the plainimage pixel values.


Full Text:

PDF

References


R.Munir, "Analisa Keamanan Enkripsi Citra Digital Menggunakan Kombinasi Dua Chaos Map dan Penerapan Teknik Selektif", Juti, vol. 10, pp89-95, 2012.

A.P. Shaikh and V. Kaul, "Enhanced Security Algorithm Using Hybrid Encryption and ECC", IOSR Journal of Computer Engineering, vol. 16, pp.80-85, 2014.

Asriyanik, "Studi Terhadap Advanced Encryption Standard (AES) dan Algoritma Knapsack Dalam Pengamanan Data", Santika, vol. 7, pp.553.561, 2017.

E. Setyaningsih, Kriptografi & Implementasi Menggunakan Matlab, Yogyakarta: Andi. 2015.

A.A. Ibrahim, "Perancangan Pengamanan Data Menggunakan Algoritma AES (Advanced Encryption Standard)", Teknik Informatika STMIK Antar Bangsa, vol. III, pp.53-60, 2017.

E.R. Agustina and A. Kurniati, "Pemanfaatan Kriptografi Dalam Mewujudkan Keamanan Informasi Pada e-Voting di Indonesia", Seminar Nasional Informatika, pp.22-28, 2009.

S. Prabowo, (2018, Jan,2). Kriptografi-Jenis Jenis Serangan dalam Kriptografi [online]. Available: http://www.sigitprabowo.id/2013/01/kriptografi-jenis-jenis-serangan-dalam.html.

N. Aleisa, "A Comparison of the 3DES and AES Encryption Standards", International Jurnal of Security and Its Applications, vol. 7, pp.241-246, 2015.

Mohtashim, (2015,apr.9). Cryptografy Hash Functions [online]. Available:https://www.tutorialspoint.com/cryptography/cryptography.html.

R. Sadikin, Kriptografi Untuk Keamanan Jaringan, Yogyakarta: Andi. 2012.

A. Widarma, "Kombinasi Algoritma AES, RC4 dan Elmagal Dalam Skema Hybrid Untuk Keamanan Data", Journal of Computer Engineering System and Science, vol. 1, pp.1-8, 2016.

V. Yuniati, G. Indriyanta and A. Rachmat, "Enkripsi dan Dekripsi dengan Algoritma AES 256 Untuk Semua Jenis File", Informatika, vol. 5, pp.23-31, 2009.

Wikipedia, (2018,jan.12). Rijdael MixColumns [online]. Available: https://en.wikipedia.org/wiki/Rijndael_MixColumns.

P. Mahajan and A. Sachdeva, “ A Stduy Of Encryption Agorithms AES, DES and RSA for Security”, Global Journal of Computer Science and Technology, Vol 13, pp.15-22, 2013.

P. Christensson, (2008, Oct.12). Aplication Definition [online]. Available: https://techterms.com/definition/application.

I. Sofana, Membangun Jaringan Komputer, Bandung: Informatika. 2013.

M. Meyers, Introducing Basic Network Concepts Capter 1, 2010.

A. Pamungkas, (2017, Jul.26). Pengolahan Citra [online]. Available: https://pemrogramanmatlab.com/2017/07/26/pengolahan-citra-digital/

T. Sutoyo, Teori Pengolahan Citra Digital, Yogyakarta: Andi. 2009.

U. Ahmad, Pengolahan Citra Digital & Teknik Pemogramannya, Yogyakarta: Graha Ilmu. 2005.

A. Purnama, (2012, Jul.23). Definisi dan Pengolahan Citra Digital [online]. Available: http://elektronika-dasar.web.id/definisi-dan-pengolahan-citra-digital/

D. Putra, Pengolahan Citra Digital, Yogyakarta: Andi Offset. 2010.

E. Sutanta, Pengantar Teknologi Informasi, Yogyakarta: Graha Ilmu. 2005.

Mohtashim, (2014, jun.12). UML Tutorial [online]. Available: https://www.tutorialspoint.com/uml/index.htm.

R. A.S and M. Shalahudin, Modul Pembelajaran: Rekayasa Perangkat Lunak (Terstruktur dan Berorientasi Objek), Bandung: Modula. 2011.

L.V. Kiong, (2012,oct.6). Visual Basic 2010 Tutorial [online]. Available: http://www.vbtutor.net/index.php/visual-basic-2010-tutorial/.




DOI: http://dx.doi.org/10.30645/jurasik.v7i1.415

DOI (PDF): http://dx.doi.org/10.30645/jurasik.v7i1.415.g392

Refbacks

  • There are currently no refbacks.



JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika)
Published Papers Indexed/Abstracted By:

Jumlah Kunjungan : View My Stats