Performance Optimization of Image Cryptography for Copyright Protection on High-Resolution Images Using the Hill Cipher with Flexible Matrix Keys

  • Miftakhul Rohman Universitas Nahdlatul Ulama Blitar
  • Abd. Charis Fauzan Universitas Nahdlatul Ulama Blitar
  • Veradella Yuelisa Mafula Universitas Nahdlatul Ulama Blitar
Keywords: Copyright Protection, Cryptography, Flexible Matrix Keys, Hill Cipher, Optimization

Abstract

The increasing use of high-resolution digital images has raised serious concerns regarding copyright protection and unauthorized distribution. Image cryptography is one of the effective approaches to safeguard visual data by transforming images into unintelligible forms. The Hill Cipher algorithm, which is based on matrix operations, has potential for image encryption; however, its application to high-resolution images often suffers from high computational cost. This study proposes a performance optimization of image cryptography for copyright protection by exploiting the flexibility of matrix key sizes in the Hill Cipher algorithm. The optimization focuses on improving computational efficiency without modifying the fundamental cryptographic mechanism. Experiments were conducted on high-resolution images using different matrix key sizes (2×2, 3×3, and 4×4). Performance was evaluated in terms of encryption and decryption time, while security robustness was assessed using Entropy, Number of Pixel Change Rate (NPCR), and Unified Average Changing Intensity (UACI). The experimental results demonstrate that increasing the matrix key size significantly reduces the total computation time, achieving up to nearly 50% performance improvement, while maintaining high security levels. The encrypted images exhibit entropy values close to the ideal level, NPCR values above 99%, and stable UACI values, indicating strong randomness and diffusion properties. These findings confirm that the proposed optimization improves computational performance without compromising cryptographic security. Therefore, the optimized Hill Cipher remains effective and suitable for copyright protection of high-resolution images.

References

Acharya, B., Panigrahy, S. K., Patra, S. K., & Panda, G. (2010). Image Encryption Using Advanced Hill Cipher Algorithm. ACEEE International Journal on Signal and Image Processing, 1(1).

Agarwal, G., Chaudhary, M., & Singh, S. (2010). Image Encryption using the Standard Hill Cipher. International Journal of Advanced Research in Compter Science, 1(4), 74–76.

Alfina, O. (2019). Enkripsi Data Citra untuk Model Warna RGB dan Treshold Menggunakan Algoritma Hill Cipher. InfoTekJar (Jurnal Nasional Informatika Dan Teknologi Jaringan), 4(1), 175–178. https://doi.org/10.30743/infotekjar.v4i1.1675

Azhar, W. Y. (2017). KRIPTANALISIS HILL CIPHER TERHADAP KNOWN PLAINTEXT ATTACK MENGGUNAKAN METODE DETERMINAN MATRIKS BERBASIS ANDROID. 8(2), 579–592.

Donni, M., Siahaan, L., Putera, A., & Siahaan, U. (2018). Application of Hill Cipher Algorithm in Securing Text Messages. INTERNATIONAL JOURNAL FOR INNOVATIVE RESEARCH IN MULTIDISCIPLINARY FIELD, 4(10), 55–59.

Dwitiyanti, N., & Satria Setiawan, H. (2021). APLIKASI OPERASI MATRIKS PADA PERANCANGAN SIMULASI METODE HILL CIPHER MENGGUNAKAN MICROSOFT EXCEL. 6(1), 41–49.

Firmanto, B., Putri, D., Ningrum, K., Bramanto, A., & Putra, W. (2021). Perbandingan Hasil Performa Optimasi Transposisi Hill Cipher dan Vigenere Cipher pada Citra Digital. SMARTICS Journal, 7(2), 65–71.

Freddy, J., Siahaan, O., Widodo, A. P., Ilmu, J., Informatika, K., Sains, F., Diponegoro, U., & Cipher, A. H. (2017). Kriptografi Teks dan Citra dengan Menggunakan Algoritma Hill Cipher pada Perangkat Android. Jurnal Masyarakat Informatika, 8(1), 9–15.

Ginting, V. S. (2020). Penerapan Algoritma Vigenere Cipher dan Hill Cipher Menggunakan Satuan Massa. Jurnal Teknologi Informasi, 4(2), 241–246. https://doi.org/10.36294/jurti.v4i2.1365

Kadir, A., & Susanto, A. (2013). Teori dan Aplikasi Pengolahan Citra.

Mafula, V. Y., Fauzan, A. C., Prabowo, T., & Ramadhan, M. R. (2025). Hill cipher-based visual cryptography for copyright protection of images using flexible matrix keys. Journal of System and Computer Engineering, 6(1), 101–116.

Mahmoud, A., & Chefranov, A. (2014). Hill Cipher Modification based on Pseudo-Random Eigenvalues. 516(2), 505–516.

Mfungo, D. E., Fu, X., Wang, X., & Xian, Y. (2023). Enhancing Image Encryption with the Kronecker xor Product, the Hill Cipher, and the Sigmoid Logistic Map. Applied Sciences (Switzerland), 13(6). https://doi.org/10.3390/app13064034

Ranti, D., Fauzi, A., Pita, M., & Sitompul, U. (2024). Digital Image Security Analysis using Hill Cipher and AES Algorithm. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 4(1).

Sari, J. I., Sihotang, H. T., & Informatika, T. (2017). Implementasi Penyembunyian Pesan Pada Citra Digital Dengan Menggabungkan Algoritma Hill Cipher Dan Metode Least Significant Bit (LSB). Jurnal Mantik Penusa, 1(2), 1–8.

Sari, N. D., & Arius, D. (2020). Modifikasi Algoritma Hill Cipher dengan Tabel Periodik Unsur Kimia Menggunakan Kode Nomor Operator Seluler di Indonesia. Jurnal Teknologi Informasi, 4(2), 202–207. https://doi.org/10.36294/jurti.v4i2.1339

Serdano, A., Zarlis, M., Sawaluddin, & Hartama, D. (2019). Pengamanan Pesan Menggunakan Algoritma Hill Cipher Dalam Keamanan Komputer. Jurnal Mahajana Informasi, 4(2), 1–5.

Siahaan, A. P. U. (2016). Genetic Algorithm in Hill Cipher Encryption. American International Journal of Research in Science, Technology, Engineering & Mathematics, 84–89.

Supiyanto, & Mandowen, S. A. (2021). Advanced hill cipher algorithm for security image data with the involutory key matrix. Journal of Physics: Conference Series, 1899(1). https://doi.org/10.1088/1742-6596/1899/1/012116

Wang, R., Fung, B. C. M., & Zhu, Y. (2020). Heterogeneous data release for cluster analysis with differential privacy. Knowledge-Based Systems, 201–202, 106047. https://doi.org/10.1016/j.knosys.2020.106047

Yang, Q., Lou, J., Liu, S., & Diao, A. (2012). A Secure Image Encryption Algorithm Based on Hill Cipher System. Bulletin of Electrical Engineering and Informatics, 1(1), 51–60. https://doi.org/10.12928/eei.v1i1.55

Published
2026-01-30
Abstract viewed = 17 times
PDF downloaded = 12 times