Implementasi Algoritma Camellia Pada Penyandian Citra USG
Abstract
Digital images are very vulnerable to data capture or theft by irresponsible parties. For the sake of maintaining the security of USG images can be done by using cryptographic techniques. Cryptographic techniques can encode ultrasound images by encrypting them in the form of codes that are not understood. Camellia Algorithm is one algorithm that can be relied upon to realize cryptographic techniques. This symmetry algorithm will produce a higher level of security to the USG image because it can encode it into a cipher with a process that is complex enough so that it will be difficult for cryptanalysts to access the image. This research will use the 128-bit Camellia Algorithm for the encryption and decryption process, so the process needs to go through several long stages in order to produce the final cipher. This algorithm requires 18 rounds where every six rounds must enter Function F and FL-1 Functions and also requires as many as 26 subkeys namely kw, k and kl. This study describes the process of securing the USG image by encoding it based on the Camellia algorithm, in the form of a password that is difficult for others to understand and understand. This is done as an effort to minimize acts of misuse of the USG image.
Downloads
References
Lanny Sutanto, Gregorius Setia Budhi, Leo Willyanto Santoso, “PERBANDINGAN METODE CAMELLIA 128 BIT KEY DAN 256 BIT KEY, “Vol. 12,No.2, pp. 109-115, Noveermber 2014.
Herman Zuhri, Mesran, Henry Kristian Siburian, “IMPLEMENTASI METODE CAMELLIA DALAM KEAMANAN DATA FILE BEREKSTENSI TXT DAN DOC, “Volume 16, Nomor 4, Oktober 2017.
& dkk Sutoyo.T., Teori Pengolahan Citra Digital, I. Yogyakarta, 2009.
E. Setyaningsih, Kriptografi & Implementasinya Menggunakan MATLAB, I. Yogyakarta:ANDI, 2015.
B.S.W Poetra and R. Wardoyo, “Perbandingan Efesiensi, Efektifitas dan Kualitas Algoritma Rijndael dengan Algoritma Camellia pada Citra Digital, “Journal off Math. Nat.Set., vol. 24, no. 3, pp. 281-291, 2014.
K. Aoki et al, “ Camellia : A 128-Bit Block Cipher Suitable for Multiple Platforms – Design and Analysis Structure of Camellia, “Springer-Verlag Berlin Heidelb, pp. 39-56, 2001.
Kasiman Peranginangin, Pengenalan MATLAB, Yogyakarta, 2006.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Algoritma Camellia Pada Penyandian Citra USG
Pages: 14-25
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















