Security information is a very important aspect that must be noticed. Information not only in the IntroductionNow a days using computers to send any kinds of information thorough internet connection are common. By using public path people from around the world can send information even though it has very low safety level.Information security is an aspect that is very important and urgent to be noticed. Informationon concerning the interests of private, institutional and corporate necessarily have a high value and should be kept confidential. Confidential information must be in great demand for various purposes and must carefully guarded. This information not only in the form of text data, but also in the form of image data that is highly confidential.By encrypting data so that only the recipient can only decrypt the data is one of solutions that many enggineers do. Some encryption algorithms such as DES, AES, RSA, and others have been widely used to encrypt the image data, but these algorithms still must be improved durability of various attacks, such as brute force attacks [1]. Many research have been done in how to improve the durability of the algorithms used in the encryption process from a brute force attack, provide a good combination of speed, high security, complexity, and computational power, etc [2], [3]. One of them is using the chaos theory. Chaos-based encryption also been extensively studied by researchers because of its superior in safety and complexity [4]. One algorithm which implements the theory of chaos is the Henon map algorithm, this algorithm implements chaos theory by generating random numbers with two initial values. The algorithm implements the chaos theory that has sensitivity to small changes in initial parameter values and has a high level of security from brute force attacks [5]- [11].Based on the above explanation, this research is about implementing the algorithm on the Henon map for the encryption and decryption of digital images information.
Security information is a very important aspect that must be noticed. Information not only in the IntroductionNow a days using computers to send any kinds of information thorough internet connection are common. By using public path people from around the world can send information even though it has very low safety level.Information security is an aspect that is very important and urgent to be noticed. Informationon concerning the interests of private, institutional and corporate necessarily have a high value and should be kept confidential. Confidential information must be in great demand for various purposes and must carefully guarded. This information not only in the form of text data, but also in the form of image data that is highly confidential.By encrypting data so that only the recipient can only decrypt the data is one of solutions that many enggineers do. Some encryption algorithms such as DES, AES, RSA, and others have been widely used to encrypt the image data, but these algorithms still must be improved durability of various attacks, such as brute force attacks [1]. Many research have been done in how to improve the durability of the algorithms used in the encryption process from a brute force attack, provide a good combination of speed, high security, complexity, and computational power, etc [2], [3]. One of them is using the chaos theory. Chaos-based encryption also been extensively studied by researchers because of its superior in safety and complexity [4]. One algorithm which implements the theory of chaos is the Henon map algorithm, this algorithm implements chaos theory by generating random numbers with two initial values. The algorithm implements the chaos theory that has sensitivity to small changes in initial parameter values and has a high level of security from brute force attacks [5]- [11].Based on the above explanation, this research is about implementing the algorithm on the Henon map for the encryption and decryption of digital images information.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.