Application of Cryptography For Military Map Image Security
Application of Cryptography For Military Map Image Security
A B S T R A C K
In today's modern era, information in the form of images is very important, especially in the military field. Image maps processed
through aerial capture must be kept confidential, so that image map data is not easily read by intruders. To apply security to
images, it is necessary to apply several methods to encrypt images. One method that can be used is the Hill Chipper Method. Hill
Chiper is a method that applies a square matrix as the key used for encryption and decryption. The hill cipher encryption process
will not replace every letter that is the same in plaintext with another that is the same, because the hill cipher uses matrix
multiplication on the basis of encryption. In this study the authors conducted experiments to encrypt map images using the hill
chipper method.
The following is the formula for the decryption process 4.2 Decryption Results
n The Decryption Result is the stage of changing the
encrypted image file into plain text so that the military
3. APPLICATION DESIGN map image file can be opened and displayed again.
Hillcipher's algorithm will inverse the entire process.
In this section, images that will be encrypted using Of course, with a suitable key password. The results of
HillChiper will go through several stages. Here are the the decryption are shown in Figures 4.3 and 4.4
steps:
The first stage, the image will be converted first to
pixels. Then the pixels are converted into a 3x3 matrix.
The second stage, enter the security key for the
image you want to encrypt.
The third stage, the results of the matrix inverse
multiplication and the key input will be combined. Then
an image cipher will be formed from the hill cipher
encryption results.
The fourth stage, namely the decryption process
where the cipher text results from the hill cipher will be
decrypted with the same key so that the final result will
be plain text from the initial image.
REFERENCES
[1] A. Abdulgader, M. Ismail, N. Zainal, and T. Idbeaa,
“Enhancement of AES algorithm based on chaotic
maps and shift operation for image encryption,” J.
Theor. Appl. Inf. Technol., vol. 71, no. 1, pp. 1–12,
2015
[2] B. Schneier, “Applied Cryptography,” Electr. Eng.,
vol. 1, no. [32, pp. 429–455, 1996, doi:
10.1.1.99.2838.
[3] A. Muhammad Abdullah and A. Muhamad
Abdullah, “Advanced Encryption Standard (AES)
Algorithm to Encrypt and Decrypt Data Advanced
Encryption Standard (AES) Algorithm to Encrypt
and Decrypt Data View project Call for papers View
project Advanced Encryption Standard (AES)
Algorithm to Encrypt and Decrypt,” 2017, [Online].
[4] W. Cao, Y. Zhou, and C. L. P. Chen, “Author ’ s
Accepted Manuscript Medical Image Encryption
Using Edge Maps Reference : To appear in : Signal
Processing Accepted date : 3 October 2016,” Signal
Processing, 2016, doi:10.1016/j.sigpro.2016.10.003.
[5] X. Chai, Y. Chen, and L. Broyde, “A novel chaos-
based image encryption algorithm using DNA
sequence operations,” Opt. Lasers Eng., vol. 88, pp.
197–213, 2017, doi:
10.1016/j.optlaseng.2016.08.009.