2022
DOI: 10.24843/jlk.2022.v11.i02.p10
|View full text |Cite
|
Sign up to set email alerts
|

Enkripsi Gambar Berdasarkan Modifikasi Bit Piksel Dengan Menggunakan Perpaduan Logistic Map Dan Henon Map

Abstract: Data theft using malware attacks in this digital era can attack smartphones and cloud servers, in 2018 there was the theft of photos belonging to Aryono Huboyo Djati. Theft can be prevented by applying cryptographic techniques. The purpose of this study was to determine the ability to combine Logistic Map and Henon Map in image encryption and decryption. These two theories were chosen because they are sensitive, with a small change in the input value will have a very significant impact on the output value. Fir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…MS Map is a modification of the Logistic map function as shown by Eq. (1), where (π‘₯ π‘šπ‘œπ‘‘ 1) = π‘₯ βˆ’ ⌊π‘₯βŒ‹ according to the definition. This equation can be expressed recursively as shown in Eq.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…MS Map is a modification of the Logistic map function as shown by Eq. (1), where (π‘₯ π‘šπ‘œπ‘‘ 1) = π‘₯ βˆ’ ⌊π‘₯βŒ‹ according to the definition. This equation can be expressed recursively as shown in Eq.…”
Section: Methodsmentioning
confidence: 99%
“…The length of the process required carrying out the encryption and decryption process was greatly influenced by the size of the dimensions and the number of pixels in a digital image. The encryption system using a combination of Logistic Map and Henon Map took more than 15 seconds to encrypt images that had dimensions of 512Γ—512; however image encryption results were not influenced by the dimensions of the encrypted image [1].…”
Section: Introductionmentioning
confidence: 99%