Image Security With a Combination Of Modified Serpent And IWT With Modified Logistic Chaotic Map

  • Kelvin Lysander Universitas Prima Indonesia
  • Allwin M Simarmata Universitas Prima Indonesia
  • Denniel Lusandy Universitas Prima Indonesia
  • Iswandi Iswandi Universitas Prima Indonesia
Keywords: image, cyptography, serpent method, steganography, integer wavalet transform

Abstract

Abstract

Cryptographic algorithms can be used to secure images. One of the cryptographic algorithms that can be used to encrypt images is the Serpent algorithm. However, the Serpent algorithm requires a long encryption and decryption process. In addition, encryption alone is not enough because it will raise suspicions so that the information will be vulnerable to being stolen. So we need a steganography technique such as the Integer Wavelet Transform (IWT) method. The secret image will be encrypted first using the Modified Serpent method, where the Serpernt modification changes the byte substitution transformation process (DES S-box) into a list of 257 prime numbers which has 128 generators to be used as keys in each round. In the insertion process using the IWT method, it is necessary to determine the position of the bits and pixels on the cover image where a message will be inserted. To determine the position, the chaos function is used. After that, the extraction process can be carried out on the stego image generated in the embedding process to recover the bits stored in it. The set of bits can be decrypted so that the original secret image will be recovered.

References

[1] Darwis, D., Wamiliana, & Junaidi, A. (2017). Proses Pengamanan Data Menggunakan Kombinasi Metode Kriptografi Data Encryption Standard dan Steganografi End Of File. Prosiding Seminar Nasional Metode Kuantitatif 2017, 228-240.
[2] Elkamchouchi, H. M., Takieldeen, A. E., & Shawky, M. A. (2018). A Modified Serpent Based Algorithm for Image Encryption. NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2018), 1-10. [3] Jan, A., Parah, S. A., & Malik, B. A. (2021). Logistic Map-Based Image Steganography Using Edge Detection. Springer Nature Singapore Pte Ltd, 447-454.
[4] Jayasudha, S. (2013). Integer Wavelet Transform Based Steganographic Method Using Opa Algorithm. Research Inventy: International Journal Of Engineering And Science, 2(4), 31-35.
[5] Kembaren, S. B., Suryadi, & Triswanto. (2018). IMPLEMENTASI ALGORITMA ENKRIPSI CITRA DIGITAL BERBASIS CHAOS MENGGUNAKAN FUNGSI KOMPOSISI LOGISTIC DAN GAUSS ITERATED MAP. Seminar Nasional Edusainstek FMIPA UNIMUS 2018, 263-272.
[6] Lestari, T., Nurmaesa, N., & Mariana, A. R. (2017). Aplikasi Steganografi Untuk Menyisipkan Pesan Dalam Media Image. JURNAL SISFOTEK GLOBAL, 7(2), 22-26.
[7] Rauf, B. W. (2020). KOMBINASI STEGANOGRAFI BIT MATCHING DAN KRIPTOGRAFI PLAYFAIR CIPHER, HILL CIPHER DAN BLOWFISH. Jurnal Teknologi Informasi, 4(2), 228-233.
[8] Taher, M. H., El_Deen, A. E., & Abo-Elsoud, M. E. (2014). HARDWARE IMPLEMENTATION OF THE SERPENT BLOCK CIPHER USING FPGA TECHNOLOGY. Journal Impact Factor, 5(10), 34-44.
[9] Ulker, M., & Arslan, B. (2018). A Novel Secure Model: Image Steganography with Logistic Map and Secret Key. IEEE.
[10] Valandar, M. Y., Ayubi, P., & Barani, M. J. (2017). A new transform domain steganography based on modified logistic chaotic map for color images. Journal of Information Security and Applications, 1-1
Published
2021-09-14