Jurnal Nasional Teknik Elektro dan Teknologi Informasi (May 2024)

Confusion and Diffusion Techniques for Image Encryption Process Based on Chaos System

  • Magfirawaty Magfirawaty,
  • Ariska Allamanda,
  • Malika Ayunasari,
  • Muhammad Nadhif Zulfikar

DOI
https://doi.org/10.22146/jnteti.v13i2.9623
Journal volume & issue
Vol. 13, no. 2
pp. 93 – 100

Abstract

Read online

Face recognition uses biometric technologies to identify humans based on their facial characteristics. This method is commonly used to restrict information access control. The benefits of face recognition systems encompass their ease of use and security. The human face recognition process consists of face detection, face tracking, and face recognition. The process uses some algorithms: the Viola-Jones for face detection, the Kanade-Lucas-Tomasi (KLT) for face tracking, and the principal component analysis (PCA) for face recognition. Furthermore, this research proposed face recognition with an encryption process to protect the data stored in a database. The encryption process consists of two main processes: confusion and diffusion. The confusion process is randomizing the position of the original image pixels. This research utilized the Arnold’s cat map (ACM) for the confusion process, and the diffusion process was performed using the XOR operation with the key generated from the 1D chaos system. Three different 1D chaos systems, namely logistic map, Bernoulli map, and tent map, were compared to see which chaos system had the best encryption results. Tests were conducted by comparing various parameters on the three proposed 1D chaos systems, including correlation coefficient, histogram analysis, entropy value, number of pixel rate changes (NPCR), and unified average change intensity (UACI). Based on testing the image encryption results, the diffusion process utilizing the tent map produced the best image encryption compared to other chaotic systems.

Keywords