Enkripsi Nilai Piksel Pada Citra Digital Dengan Algoritma Piecewise Linear Chaotic Map
DOI:
https://doi.org/10.47065/bulletincsr.v3i1.206Keywords:
Digital Image; Encryption; Piecewise Linear Chaotic MapAbstract
The process of recording, storing and sharing digital images is very easy to do nowadays. To protect the information in the image, the image can be encrypted by scrambling the image into an unintelligible image form. The Piecewise Linear Chaotic Map algorithm is used in research to encrypt images. The trick is that the Piecewise Linear Chaotic Map algorithm generates random numbers, and these random numbers are used to randomize image pixel values using the XOR function. The application implements the Piecewise Linear Chaotic Map method to encrypt pixel values in digital images, so that only certain parties who know the key can access digital images.
Downloads
References
Li, S., and Zheng, X., 2014, On The Security of an Image Encryption Method, China; Xi’an Jiaotong University.
Wang Y., Liu Z., and Lei P., 2014 Cryptographic Properties Analysis of Piecewise Logistic Map, Chongqing, China; Chongqing University of Posts and Telecommunications
Mondal and Mandal, 2016, A Light Weight Secure Image Encryption Scheme Based on Chaos & DNA Computing. Jharkhand, India; Jurnal of King Saud University Computer and Information Sciences
B. Mesterjon, dan L.N. Zulita, Implementasi Metode Selection Sort untuk Menentukan Nilai Prestasi Siswa Kelas 3 dan Kelas 4 SD Negeri 107 Seluma, Bengkulu: Universitas Dehasen, 2015.
Kamus Besar Bahasa Indonesia (KBBI), Pengertian Implementasi, http://kbbi.web.id/implementasi, 2020.
Ario, Implementasi Peraturan Presiden nomor 26 tahun 2009 tentang Penerapan E-KTP Berbasis NIK di Samarinda, Jakarta: E-journal Ilmu Pemerintahan, 2016.
Tarigan, Analisis Dan Implementasi Algoritma Linear Search Pada Permainan Word Scramble, Medan: USU, 2015.
Yulita, Algoritma dan Pemrograman, Yogyakarta: STMIK Amikom, 2018.
Sitorus, Algoritma dan Pemrograman, Yogyakarta: Andi, 2015.
Sigiro. Analisis Dan Implementasi Penyelesaian Game Minesweeper Menggunakan Algoritma Greedy Best First Search. Medan: Universitas Sumatera Utara, 2016.
Wahid, Dasar-Dasar Algoritma & Pemrograman, Yogyakarta: Andi, 2017.
Utami dan Sukrisno, 10 Langkah Belajar Logika dan Algoritma Menggunakan Bahasa C dan C++ di GNU/Linux. Yogyakarta: Andi, 2019.
R. Munir, Algoritma Enkripsi Citra Berbasis Chaos dengan Penggabungan Teknik Permutasi dan Teknik Substitusi Menggunakan Arnold Cat Map dan Logistic Map, Bandung: ITB, 2015.
Tjahjono, dkk, Implementasi Unique Code Nominal Transfer Menggunakan Metode Linear Congruential Generator untuk Order Deposit, Pasuruan: Universitas Merdeka, 2016.
X. Wang, and D. Chen, A Parallel Encryption Algorithm Based on Piecewise Linear Chaotic Map, Harbin, China: Hindawi Publishing Corporation, 2018.
A. Awad, and A. Saadane, New Chaotic Permutation Methods for Image Encryption, Orleans, France: IAENG International Journal of Computer Science, 2015.
R. Munir, Matematika Diskrit, Bandung: Informatika, 2014.
D. Ariyus, Kriptografi, Yogyakarta: Andi, 2015.
R. Munir, Kriptografi, Bandung: Informatika, 2016.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Enkripsi Nilai Piksel Pada Citra Digital Dengan Algoritma Piecewise Linear Chaotic Map
ARTICLE HISTORY
How to Cite
Issue
Section
Copyright (c) 2022 Robby Wijaya

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).













