Visible to the public Implementation of Rail Fence Cipher and Myszkowski Algorithms and Secure Hash Algorithm (SHA-256) for Security and Detecting Digital Image Originality

TitleImplementation of Rail Fence Cipher and Myszkowski Algorithms and Secure Hash Algorithm (SHA-256) for Security and Detecting Digital Image Originality
Publication TypeConference Paper
Year of Publication2022
AuthorsRojali, Rasjid, Zulfany Erlisa, Matthew, Justin Cliff
Conference Name2022 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)
Date Publishednov
KeywordsCiphers, compositionality, cryptography, digital images, hash algorithms, Hash Function, Hash functions, Histograms, Image resolution, Multimedia systems, Myszkowski, pubcrawl, Rail Fence Cipher, Rails, resilience, Resiliency, SHA-256
AbstractThe use of digital images is increasingly widespread currently. There is a need for security in digital photos. Cryptography is a technique that can be applied to secure data. In addition to safety, data integrity also needs to be considered to anticipate the image being manipulated. The hash function is a technique that can be used to determine data authentication. In this study, the Rail Fence Cipher and Myszkowski algorithms were used for the encryption and decryption of digital images, as the Secure Hash Algorithm (SHA-256) algorithm. Rail Fence Cipher Algorithm is a transposition algorithm that is quite simple but still vulnerable. It is combined with the Myszkowski Algorithm, which has a high level of complexity with a simple key. Secure Hash Algorithm (SHA-256) is a hash function that accepts an input limit of fewer than 264 bits and produces a fixed hash value of 256 bits. The tested images vary based on image resolution and can be encrypted and decrypted well, with an average MSE value of 4171.16 and an average PSNR value of 11.96 dB. The hash value created is also unique. Keywords--Cryptography, Hash Function, Rail Fence Cipher, Myszkowski, SHA-256, Digital image.
DOI10.1109/ICIMCIS56303.2022.10017975
Citation Keyrojali_implementation_2022