The Implementation of Affine Group Algebra on Digital Image Security

Authors

  • Rendra Soekarta Universitas Muhammadiyah Sorong
  • Miftah Sigit Universitas Muhammadiyah Sorong

DOI:

https://doi.org/10.12928/mf.v4i2.5992

Keywords:

Crypthography, Affine Transform, Affine Group, Digital Image

Abstract

The concept of group theory has been applied to digital image security using the DES algorithm and wavelet transform. Affine Cipher algorithm was a symmetric cryptographic algorithm. This was
initiated for studying further the implementation of the Affine group on the Affine transformation.
More over, digital image used the Affine algorithm in security. The purpose of this paper was
described the implementation of the existence of an Affine Group in the Affine transformation carried out in digital image cryptography. The concept of maintaining geometric shapes in Affine
transformations and bijective nature of each Affine transformation could be formed an Affine group.

References

A. Yosanny, “Perancangan Enkripsi Pada Citra Bitmap Dengan Algoritma Des, Triple Des, dan Idea,” ComTech Comput. Math. Eng. Appl., vol. 1, no. 2, p. 853, 2010, doi: 10.21512/comtech.v1i2.2618.

S. El-Zoghdy, Y. Nada, and A. Abdo, “How Good Is The DES Algorithm In Image Ciphering?,” Int. J., vol. 803, no. February, pp. 796–803, 2011, [Online]. Available: http://ijana.in/papers/v2i5-1.pdf.

M. Toorani and A. Falahati, “A secure cryptosystem based on affine transformation,” Secur. Commun. Networks, vol. 4, no. 2, pp. 207–215, 2011, doi: 10.1002/sec.137.

E. S. Pasaribu, “Penerapan Aritmatika Modulusdan Matriks dalam Cipher Hill,” 2012.

M. L. Wijaya, K. Yulianti, and H. S. Husain, “Kriptografi Dengan Komposisi Caesar Cipher Dan Affine Cipher Untuk Mengubah Pesan Rahasia,” J. EurekaMatika, vol. 5, no. 1, pp. 30–45, 2017.

M. Ramalingam, N. A. Mat Isa, and R. Puviarasi, “A secured data hiding using affine transformation in video steganography,” Procedia Comput. Sci., vol. 171, no. 2019, pp. 1147–1156, 2020, doi: 10.1016/j.procs.2020.04.123.

A. Nag et al., “Image encryption using affine transform and XOR operation,” 2011 - Int. Conf. Signal Process. Commun. Comput. Netw. Technol. ICSCCN-2011, no. Icsccn, pp. 309–312, 2011, doi: 10.1109/ICSCCN.2011.6024565.

M. S. Rahmawati and R. Soekarta, “Teori Grup Pada Algoritma DES Dan Transformasi Wavelet Diskrit Dalam Program Aplikasi Keamanan Citra Digital,” Insect (Informatics …, vol. 4, no. 1, 2019, [Online]. Available: http://ejournal.um-sorong.ac.id/index.php/insect/article/view/281.

M. S. Rahmawati and R. Soekarta, “Penerapan Aljabar Linear pada Transformasi Wavelet Diskrit dalam Program Aplikasi Keamanan Citra Digital,” in SEMINAR MATEMATIKA DAN PENDIDIKAN MATEMATIKA UNY, 2019, pp. 1–6.

Q. Qin and N. Wang, “Wavelet transform associated to the affine group AGmp,” Approx. Theory its Appl., vol. 11, no. 4, pp. 45–50, 1995, doi: 10.1007/BF02836829.

S. A. Babu, P. Analyst, and R. Technologies, “Modification Affine Ciphers Algorithm for Cryptography Password,” Int. J. Res. Sci. Eng., vol. 3, no. 2, pp. 346–351, 2017.

B. Y. Chong and I. Salam, “Investigating deep learning approaches on the security analysis of cryptographic algorithms,” Cryptography, vol. 5, no. 4, 2021, doi: 10.3390/cryptography5040030.

Baha Eldin Hamouda Hassan, “Comparative study of different cryptographic algorithms,” J. Inf. Secur., vol. 11, pp. 138–148, 2020, doi: 10.4236/jis.2020.113009.

A. B. Nasution, “MODIFIKASI ALGORITMA AFFINE CIPHER UNTUK,” (Jurnal Teknol. Inf., vol. 4, no. 2, pp. 377–382, 2020.

M. Kharolina, “Implementasi Algoritma Affine Cipher Pada Citra Menggunakan Binomial Newton Sebagai Matriks Kunci,” Pelita Inform. Budi Darma, vol. XVI, no. 1, pp. 52–54, 2017.

J. Gallier, “Basics of Affine Geometry,” Geom. Methods Appl., vol. 38, pp. 7–63, 2011, doi: 10.1007/978-1-4419-9961-0_2.

Downloads

Published

2023-02-15

Issue

Section

Articles