Computer Vision Conference (CVC) 2026
21-22 May 2026
Publication Links
IJACSA
Special Issues
Computer Vision Conference (CVC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 16 Issue 8, 2025.
Abstract: Security is an essential aspect to consider during data transmission, especially images. Threats that may occur during image transmission include images being stolen by third parties. One way to secure images is through encryption-decryption processes using cryptographic algorithms. One of the algorithms developed for image security involves combining a chaos scheme, DNA encoding, and hashing. Chaos scheme refers to a system sensitive to initial conditions, resulting in behavior that is difficult to predict or appears random. DNA encoding is the process of converting bits into a DNA sequence. Hashing is a mathematical function which takes variable inputs and converts them into a binary sequence with fixed length. In this research, security enhancement is achieved by replacing the hashing algorithm with Secure Hash Algorithm (SHA) 3 Keccak. This study successfully implemented cryptographic algorithms into a website that can simulate image encryption-decryption processes in about 15 seconds per process. The effectiveness of the algorithm used has also been tested in abstracting images through Mean Squared Error (MSE) and Peak-Signal-to-Noise-Ratio (PSNR) evaluations. Obtained MSE values of 0 and PSNR values of infinity indicated that the original images and decrypted images are identical.
Amer Sharif, Dian Rachmawati and Wilbert. “Securing Image Messages Using Secure Hash Algorithm 3, Chaos Scheme, and DNA Encoding”. International Journal of Advanced Computer Science and Applications (IJACSA) 16.8 (2025). http://dx.doi.org/10.14569/IJACSA.2025.0160858
@article{Sharif2025,
title = {Securing Image Messages Using Secure Hash Algorithm 3, Chaos Scheme, and DNA Encoding},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2025.0160858},
url = {http://dx.doi.org/10.14569/IJACSA.2025.0160858},
year = {2025},
publisher = {The Science and Information Organization},
volume = {16},
number = {8},
author = {Amer Sharif and Dian Rachmawati and Wilbert}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.