Visual Cryptography with RSA Algorithm for Color Image
RSA algorithm founded by Rivest, Shamir and Adleman is an algorithm that based on the use of factorization of a significant number to its factor, and the element must be the prime number. Factorization used to find the private key. In this paper, the RSA algorithm will be used in a visual cryptograp...
Saved in:
Published in | International journal of engineering & technology (Dubai) Vol. 7; no. 2.5; p. 65 |
---|---|
Main Authors | , , , , , , , , , , |
Format | Journal Article |
Language | English |
Published |
10.03.2018
|
Online Access | Get full text |
Cover
Loading…
Abstract | RSA algorithm founded by Rivest, Shamir and Adleman is an algorithm that based on the use of factorization of a significant number to its factor, and the element must be the prime number. Factorization used to find the private key. In this paper, the RSA algorithm will be used in a visual cryptographic to encrypt and decrypt a color image. The test will conduct with five different photos. Assessment performed using Structural similarity (SSIM) to compare the matrix value of the initial image with the decrypted image. SSIM generates a value of 1 on all pictures. The proves that the Matrix Value in the initial and after decoded images has the same amount. The image decryption will worsen; can be seen from the smaller SSIM value. |
---|---|
AbstractList | RSA algorithm founded by Rivest, Shamir and Adleman is an algorithm that based on the use of factorization of a significant number to its factor, and the element must be the prime number. Factorization used to find the private key. In this paper, the RSA algorithm will be used in a visual cryptographic to encrypt and decrypt a color image. The test will conduct with five different photos. Assessment performed using Structural similarity (SSIM) to compare the matrix value of the initial image with the decrypted image. SSIM generates a value of 1 on all pictures. The proves that the Matrix Value in the initial and after decoded images has the same amount. The image decryption will worsen; can be seen from the smaller SSIM value. |
Author | Ratnadewi Santoso Sugiharto, Benny Saleh Ahmar, Ansari Rahim, Robbi Bagus Ary Indra Iswara, Ida Napitupulu, Darmawan Laritmas, Selfianus Kurniawati, Nanik Mouw, Erland Kurniasih, Nuning Abdullah, Dahlan |
Author_xml | – sequence: 1 givenname: Ratnadewi surname: . fullname: ., Ratnadewi – sequence: 2 givenname: Benny surname: Santoso Sugiharto fullname: Santoso Sugiharto, Benny – sequence: 3 givenname: Nuning surname: Kurniasih fullname: Kurniasih, Nuning – sequence: 4 givenname: Dahlan surname: Abdullah fullname: Abdullah, Dahlan – sequence: 5 givenname: Ida surname: Bagus Ary Indra Iswara fullname: Bagus Ary Indra Iswara, Ida – sequence: 6 givenname: Darmawan surname: Napitupulu fullname: Napitupulu, Darmawan – sequence: 7 givenname: Selfianus surname: Laritmas fullname: Laritmas, Selfianus – sequence: 8 givenname: Erland surname: Mouw fullname: Mouw, Erland – sequence: 9 givenname: Ansari surname: Saleh Ahmar fullname: Saleh Ahmar, Ansari – sequence: 10 givenname: Nanik surname: Kurniawati fullname: Kurniawati, Nanik – sequence: 11 givenname: Robbi surname: Rahim fullname: Rahim, Robbi |
BookMark | eNqdzr0OgjAUBeDGYCIqL-DUFwD7h8hIiEZXNcataUyBEqCkRQ1vLxIHZ5d77hlO8s2B0-hGArDCKMCM4XitStkFz0iRIAwwjUM6AS4hJPJDwm7Ozz8DnrUlQghThrcsdsHmquxDVDA1fdvp3Ii26OFLdQU8nROYVLk2Q6lhpg1MdTXcYy1yuQTTTFRWet9cALLfXdKDfzfaWiMz3hpVC9NzjPiI5B8k_yB5yEck_Wv0BvrPSSs |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.14419/ijet.v7i2.5.13953 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2227-524X |
ExternalDocumentID | 10_14419_ijet_v7i2_5_13953 |
GroupedDBID | AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION KQ8 M~E RNS |
ID | FETCH-crossref_primary_10_14419_ijet_v7i2_5_139533 |
ISSN | 2227-524X |
IngestDate | Fri Aug 23 01:24:01 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 2.5 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-crossref_primary_10_14419_ijet_v7i2_5_139533 |
ParticipantIDs | crossref_primary_10_14419_ijet_v7i2_5_13953 |
PublicationCentury | 2000 |
PublicationDate | 2018-03-10 |
PublicationDateYYYYMMDD | 2018-03-10 |
PublicationDate_xml | – month: 03 year: 2018 text: 2018-03-10 day: 10 |
PublicationDecade | 2010 |
PublicationTitle | International journal of engineering & technology (Dubai) |
PublicationYear | 2018 |
SSID | ssj0001341849 |
Score | 4.153274 |
Snippet | RSA algorithm founded by Rivest, Shamir and Adleman is an algorithm that based on the use of factorization of a significant number to its factor, and the... |
SourceID | crossref |
SourceType | Aggregation Database |
StartPage | 65 |
Title | Visual Cryptography with RSA Algorithm for Color Image |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8JAEN4gXvRgfMZ39uDNtMrSBz0qalADB0TDreljsTXSEmhj9OB_8B87sy1lEUzEy6bZtNNu5svszNeZWUJOKh5uS56rgDPq4W_GqmLVer6ia07F8JlrcB8LnJsto_Go3XX1bqn0JWUtpYmreh9z60r-o1WYA71ilewCmi2EwgRcg35hBA3D-CcdP4UjrP6oD98HSd56OiNW2w9Ivj_HEPkHfZFJWI_xKI3bvjOd-zNNCEptJPikT6FAR1JQ8OiTXqUuHmNdkAjCxLSdJHJ8_hYWrA0eUDyKwTg9hwF8vmBlL8GyFzT-fYpVYaNQcDutNBrvo-J_lA_RsRNkiffBa47inKCoiIq9PFVV2DGstoV4N0vEVPmcudwQmxLemKpLZjU7TmLG2oMrh91SwxcOMswQnlHBoc2aD0-31v6x5RWJiBgCoRQbZdgow9ZtIWOJLDPT0jFLtPkp0Xaw69dEUFUsIS_FQjFnM58iuTuS39JZJ2t5wEEvMvRskBKPNsmq1IZyixgZjqiMI4o4ooAjWuCIAo6owBEVONom7Oa6U28o41fbg6x1if37eqs7pBzFEd8l1Dd1rplVpmvc0XyIx3sVZjDNMFxmudY53yOnCwjeX-juA7IywdAhKSfDlB-B25e4x0IR3wQUXUk |
link.rule.ids | 315,786,790,27955,27956 |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Visual+Cryptography+with+RSA+Algorithm+for+Color+Image&rft.jtitle=International+journal+of+engineering+%26+technology+%28Dubai%29&rft.au=.%2C+Ratnadewi&rft.au=Santoso+Sugiharto%2C+Benny&rft.au=Kurniasih%2C+Nuning&rft.au=Abdullah%2C+Dahlan&rft.date=2018-03-10&rft.issn=2227-524X&rft.eissn=2227-524X&rft.volume=7&rft.issue=2.5&rft.spage=65&rft_id=info:doi/10.14419%2Fijet.v7i2.5.13953&rft.externalDBID=n%2Fa&rft.externalDocID=10_14419_ijet_v7i2_5_13953 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2227-524X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2227-524X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2227-524X&client=summon |