Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security

Christy Atika Sari, Eko Hari Rachmawanto, Christanto Antonius Haryanto


Advances in technology in the field of internet, making the Internet become the most popular data transmission media for now. This is certainly not free from the incidence of cyber crime, such as theft and data modification. Given the losses caused by data manipulation is very detrimental to the owner, then the original data can be misused in the cyber world. Cryptography offers an algorithm for randomizing data, so it can not be read by unauthorized people. The cryptography technique was implemented using Triple Data Encyption Standard (3DES) given the results of a randomized cryptographic algorithm, it is possible to arouse suspicion from the viewer. For that will be done the process of insertion of cryptographic files into another media in the form of images commonly referred to as steganography. The steganography technique that will be used is End of File (EOF). The combination of 3DES and EOF in the 64x64 pixel image with grayscale color format produces the fastest image processing time of 173.00192 seconds with the highest Peak Signal to Noise Ratio (PSNR) value of 25.0004 dB, while in the 128x128 pixel image with grayscale format has produced the highest PSNR 21.0084 dB.


Cryptography, Triple Data Encryption Standard (3DES), End Of File (EOF), Peak Signal to Noise Ratio (PSNR)

Full Text:



Thakur, J., & Kumar, N. (2011). DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis. InternationalJournalofEmerging TechnologyandAdvancedEngineering, 1(2), 6-12.

Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital Image Steganography: Survey and Analysis of Current Methods. Signal processing,90(3), 727-752.

Cole, E. (2003) Hiding in Plain Sight: Steganography and the Art of. Indianapolis, Indiana, Canada: Wiley Publishing.

Ardy, R. D., Indriani, O. R., Sari, C. A., & Rachmawanto, E. H. (2017, November). Digital Image Signature Using Triple Protection Cryptosystem (RSA, Vigenere, and MD5). In Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS), 2017 International Conference on (pp.87-92). IEEE.

Sari, W . S., Rachmawanto, E. H., & Sari, C. A. (2017). A Good Performance OTP Encryption Image Based on DCT-DWT Steganography. Telkomnika,15(4), 1987-1995.

Kusuma, E. J., Indriani, O. R., Sari, C. A., & Rachmawanto, E. H. (2017, November). An Imperceptible LSB Image Hiding on Edge Region Using DES Encryption. In Innovative and Creative Information Technology (ICITech), 2017 International Conference on (pp. 1-6). IEEE.

Ardiansyah, G., Sari, C. A., & Rachmawanto, E. H. (2017, November). Hybrid Method using 3-DES, DWT and LSB for Secure Image Steganography Algorithm. In Information Technology, Information Systems and Electrical Engineering (ICITISEE), 2017 2nd International conferences on (pp. 249-254). IEEE.

Nilesh, D., & Nagle, M. (2014, January). The New Cryptography Algorithm with High Throughput. In Computer Communication and Informatics (ICCCI), 2014 International Conference on (pp. 1-5). IEEE.

Kaur, A. (2017). A Review on Symmetric Key Cryptography Algorithms. International Journal of Advanced Research in Computer Science, 8(4): 358-362.

Watters, P., Martin, F., & Stripf, H. S. (2008). Visual Detection of LSB- Encoded Natural Image Steganography. World Wide Web Internet And Web Information Systems, 5(1): 24–32.

Almohammad, A., & Ghinea, G. (2010, July). Stego Image Quality and the Reliability of PSNR. In Image Processing Theory Tools and Applications (IPTA),20102ndInternationalConferenceon(pp.215-220). IEEE.

Rachmawanto, E. H., & Sari, C. A. (2017, October). A Performance Analysis Stegocrypt Algorithm Based on LSB-AES 128 bit in Various Image Size. In Application for Technology of Information and Communication (iSemantic), 2017 International Seminar on (pp. 16-21). IEEE.

Li, X., Zhang, W., Ou, B., & Yang, B. (2014, July). A Brief Review on Reversible Data Hiding: Current Techniques and Future Prospects. In Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & InternationalConferenceon(pp.426-430). IEEE.



  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.