HASIL ANALISIS STATISTIK, DIFERENSIAL, DAN KUALITAS CITRA TERHADAP KOMPOSISI LOGISTIC CIRCLE MAP

Authors

  • Makmun Makmun Universitas Gunadarma

DOI:

https://doi.org/10.56127/juit.v2i1.456

Keywords:

bifurcation, lyapunov, exponent

Abstract

The problem of data security is still a matter of concern in the digital era like today. An effective security method is needed and it is difficult to break into. Encryption is an effective method of ensuring data security. The encryption algorithm is built using a chaotic cipher base so that performance in securing data and information increases. The new chaotic composition resulting from two chaotic maps will have better randomness. Logistic Map and Circle Map were chosen because they have good randomness. The new chaotic composition is called the Logistic Circle Map (LC Map). By bifurcation diagram test, Lyapunov Exponent, and NIST random test, the best density occurs at X_0=0.9 , K = 1000, r = 3.7 and Ω = 0.4. The new chaotic composition parameters have passed all 16 NIST (National Institute of Standards and Technology) tests. There are four parameters used in this study in order to obtain a sufficiently high key space, namely 1.296 ×〖 10〗^84 combinations and having a high level of lock sensitivity of 10−17. The image encryption algorithm of the LC Map function has high resistance against various attacks. This can be proven by carrying out key space tests, sensitivity tests for key spaces, histogram tests, entropy, correlation coefficients, and differential tests using the UACI NPCR. The test results on digital image decryption using the Mean Square Error (MSE) show a result of 0 and the Peak Signal to Noise Ratio (PSNR) shows a result of ∞. That is, the encrypted image is similar to the original image.

References

Menezes, A. J. (2018), Van Oorschot, P. C. & Vanstone, S. A., Handbook of applied cryptography, CRC press,

P. Stallings, W. (2014) , Cryptography and network security, 4/E, Pearson Education India

Boyland, P. L. (1986) ‘Bifurcations of circle maps: Arnol’d tongues, bistability and rotation intervals’, Communications in Mathematical Physics 106(3), 353–381,

Munir, R (2006), ‘Kriptografi. bandung’, Informatika 1(7).,

Varberg D, Purcel E and Rigdon KS (1998), Calculus (9th Edition) PDF

Wolf A, et al., (1985), Determining Lyapunov exponents from a time series,

Kocarev L and Lian S, (2011) , Chaos-Based Cryptography: Theory, Algorithm and Applications, Berlin: Springer-Verlag.

Andrew Rukhin, Juan Soto, et.all, (2010), A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22 Revision 1a,

Fu, C., Chen, J.-j., Zou, H., Meng, W.-h., Zhan, Y.-f. & Yu, Y.-w. (2012), ‘A Chaos-based digital image encryption scheme with an improved diffusion strategy’, Optics express 20(3), 2363–2378,

Munir, R. (2012), ‘Analisis keamanan algoritma enkripsi citra digital menggunakan kombinasi dua chaos map dan penerapan teknik selektif’, Jurnal Ilmiah Teknologi Informasi 10(2), 89–95.

Downloads

Published

2023-01-16

How to Cite

Makmun, M. (2023). HASIL ANALISIS STATISTIK, DIFERENSIAL, DAN KUALITAS CITRA TERHADAP KOMPOSISI LOGISTIC CIRCLE MAP. Jurnal Ilmiah Teknik, 2(1), 01–10. https://doi.org/10.56127/juit.v2i1.456

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.