Hill Cipher-Based Visual Cryptography for Copyright Protection of Images Using Flexible Matrix Keys
Abstract
The widespread distribution of digital images on the internet has diminished the copyright protection associated with them. In some cases, copyrighted and economically valuable digital images should not be modified or distributed without permission, as altering the original image can harm its owner. This violation is common, but many internet users are unaware of it. The goal of this research is to protect intellectual property rights of digital images using visual cryptography based on the Hill Cipher algorithm with matrix key flexibility. Hill Cipher is chosen for its ability to encrypt data in blocks, making it more secure than classical cryptographic algorithms that encrypt data individually. Visual cryptography is used to secure digital images through encryption and decryption. Encryption scrambles the image, while decryption restores it. The research method involves collecting digital image datasets, preprocessing, Hill Cipher encryption, and decryption. Key flexibility includes matrix keys of 2x2, 3x3, and 4x4 to enhance security. This research has demonstrated the effectiveness of the Hill Cipher algorithm in protecting digital images through encryption and decryption processes with flexible matrix keys of size 2x2 and 3x3. The results of the experiments, including encryption and decryption using both matrix sizes, have been thoroughly analyzed with respect to various cryptographic metrics: histogram analysis, energy, entropy, and running time.
References
Acharya, B., Panigrahy, S. K., Patra, S. K., & Panda, G. (2010). Image Encryption Using Advanced Hill Cipher Algorithm. ACEEE International Journal on Signal and Image Processing, 1(1).
Agarwal, G., Chaudhary, M., & Singh, S. (2010). Image Encryption using the Standard Hill Cipher. International Journal of Advanced Research in Compter Science, 1(4), 74–76.
Alfina, O. (2019). Enkripsi Data Citra untuk Model Warna RGB dan Treshold Menggunakan Algoritma Hill Cipher. InfoTekJar (Jurnal Nasional Informatika Dan Teknologi Jaringan), 4(1), 175–178. https://doi.org/10.30743/infotekjar.v4i1.1675
Azhar, W. Y. (2017). KRIPTANALISIS HILL CIPHER TERHADAP KNOWN PLAINTEXT ATTACK MENGGUNAKAN METODE DETERMINAN MATRIKS BERBASIS ANDROID. 8(2), 579–592.
Donni, M., Siahaan, L., Putera, A., & Siahaan, U. (2018). Application of Hill Cipher Algorithm in Securing Text Messages. INTERNATIONAL JOURNAL FOR INNOVATIVE RESEARCH IN MULTIDISCIPLINARY FIELD, 4(10), 55–59.
Dwitiyanti, N., & Satria Setiawan, H. (2021). APLIKASI OPERASI MATRIKS PADA PERANCANGAN SIMULASI METODE HILL CIPHER MENGGUNAKAN MICROSOFT EXCEL. 6(1), 41–49.
Firmanto, B., Putri, D., Ningrum, K., Bramanto, A., & Putra, W. (2021). Perbandingan Hasil Performa Optimasi Transposisi Hill Cipher dan Vigenere Cipher pada Citra Digital. SMARTICS Journal, 7(2), 65–71.
Freddy, J., Siahaan, O., Widodo, A. P., Ilmu, J., Informatika, K., Sains, F., Diponegoro, U., & Cipher, A. H. (2017). Kriptografi Teks dan Citra dengan Menggunakan Algoritma Hill Cipher pada Perangkat Android. Jurnal Masyarakat Informatika, 8(1), 9–15.
Ginting, V. S. (2020). Penerapan Algoritma Vigenere Cipher dan Hill Cipher Menggunakan Satuan Massa. Jurnal Teknologi Informasi, 4(2), 241–246. https://doi.org/10.36294/jurti.v4i2.1365
Kadir, A., & Susanto, A. (2013). Teori dan Aplikasi Pengolahan Citra.
Mahmoud, A., & Chefranov, A. (2014). Hill Cipher Modification based on Pseudo-Random Eigenvalues. 516(2), 505–516.
Mfungo, D. E., Fu, X., Wang, X., & Xian, Y. (2023). Enhancing Image Encryption with the Kronecker xor Product, the Hill Cipher, and the Sigmoid Logistic Map. Applied Sciences (Switzerland), 13(6). https://doi.org/10.3390/app13064034
Ranti, D., Fauzi, A., Pita, M., & Sitompul, U. (2024). Digital Image Security Analysis using Hill Cipher and AES Algorithm. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 4(1).
Sari, J. I., Sihotang, H. T., & Informatika, T. (2017). Implementasi Penyembunyian Pesan Pada Citra Digital Dengan Menggabungkan Algoritma Hill Cipher Dan Metode Least Significant Bit (LSB). Jurnal Mantik Penusa, 1(2), 1–8.
Sari, N. D., & Arius, D. (2020). Modifikasi Algoritma Hill Cipher dengan Tabel Periodik Unsur Kimia Menggunakan Kode Nomor Operator Seluler di Indonesia. Jurnal Teknologi Informasi, 4(2), 202–207. https://doi.org/10.36294/jurti.v4i2.1339
Serdano, A., Zarlis, M., Sawaluddin, & Hartama, D. (2019). Pengamanan Pesan Menggunakan Algoritma Hill Cipher Dalam Keamanan Komputer. Jurnal Mahajana Informasi, 4(2), 1–5.
Siahaan, A. P. U. (2016). Genetic Algorithm in Hill Cipher Encryption. American International Journal of Research in Science, Technology, Engineering & Mathematics, 84–89.
Supiyanto, & Mandowen, S. A. (2021). Advanced hill cipher algorithm for security image data with the involutory key matrix. Journal of Physics: Conference Series, 1899(1). https://doi.org/10.1088/1742-6596/1899/1/012116
Wang, R., Fung, B. C. M., & Zhu, Y. (2020). Heterogeneous data release for cluster analysis with differential privacy. Knowledge-Based Systems, 201–202, 106047. https://doi.org/10.1016/j.knosys.2020.106047
Yang, Q., Lou, J., Liu, S., & Diao, A. (2012). A Secure Image Encryption Algorithm Based on Hill Cipher System. Bulletin of Electrical Engineering and Informatics, 1(1), 51–60. https://doi.org/10.12928/eei.v1i1.55