- A. Syahputra, I. Algoritma, and F. Untuk, “Implementasi Algoritma Freivlds Untuk Pembangkitan Kunci Algoritma RSA Pada Pengamanan Data Video,” vol. 10, pp. 70–77, 2021
- R. B. Fernandez et al., “PENGGUNAAN METODE HENON MAP DAN CHAOS LOGISTIC MAP ( CLM ) DALAM ENKRIPSI CITRA DIGITAL 24-BIT,” vol. 5, no. 1, pp. 52–70, 2017
- R. Sujarani and D. Manivannan, “Available Online through Research Article,” Ijrap.Net, vol. 4, no. 1, pp. 4060–4066, 2016
- P. S. Sneha, S. Sankar, and A. S. Kumar, “A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–Tent maps,” J. Ambient Intell. Humaniz. Comput., vol. 11, no. 3, pp. 1289–1308, 2020, doi: 10.1007/s12652-019-01385-0
- D. Elmaci and N. Bas Catak, “An Efficient Image Encryption Algorithm for the Period of Arnold ’ s CAT Map,” vol. 2, no. 2, 2018
- P. Sankhe, S. Pimple, S. Singh, A. Lahane, S. V. Sem, and C. Engg, “An Image Cryptography using Henon Map and Arnold Cat Map .,” pp. 1900–1904, 2018
- A. Afifi, “A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map,” Int. J. Netw. Secur. Its Appl., vol. 11, no. 4, pp. 19–30, 2019, doi: 10.5121/ijnsa.2019.11402
- T. Anna, M. A. I. Pakereng, and Y. R. Beeh, “Implementasi Algoritma Chaos-Based Feedback Stream Cipher pada Enkripsi-Dekripsi Data Citra Digital,” J. Inform., vol. 5, no. 2, pp. 151–169, 2009
- R. K. Sinha, N. San, B. Asha, S. Prasad, and S. S. Sahu, “Chaotic Image Encryption Scheme Based on Modified Arnold Cat Map and Henon Map,” Proc. 2018 Int. Conf. Curr. Trends Towar. Converging Technol. ICCTCT 2018, pp. 1–5, 2018, doi: 10.1109/ICCTCT.2018.8551137
- A. Susanto, “Penerapan Teori Chaos di dalam Kriptografi,” 2008
- M. W. Habiby and D. Lestari, “Cryptography System for Information Security Using Chaos Arnold ’ s Cat Map Function,” pp. 61–66, 2017
- W. J. Hadiman, J. Tjandra, and I. Fadillah, “W.J Hadiman 1 , J Tjandra 1 , I Fadillah 1 1,” pp. 1–6, 2020
- Suhardi, “APLIKASI KRIPTOGRAFI DATA SEDERHANA DENGAN METODE EXLUSIVE-OR ( XOR ),” vol. 03, pp. 23–31, 2016
- C. Solomon and T. Breckon, Fundamentals of Digital Image Processing. 2011
- A. S. Bader, S. Hameed, and M. A. A. K., “Key Generation based on Henon map and Lorenz system,” Al-Mustansiriyah J. Sci., vol. 31, no. 1, p. 41, 2020, doi: 10.23851/mjs.v31i1.734
- N. A. Abbas, “Image encryption based on Independent Component Analysis and Arnold’s Cat Map,” Egypt. Informatics J., vol. 17, no. 1, pp. 139–146, 2016, doi: 10.1016/j.eij.2015.10.001
- A. Bostan, M. Karakaya, and G. Şengül, “CHAOS- BASED DATA ENCRYPTION USING ARNOLD ’ S CAT MAP,” vol. 4, no. 1, pp. 25–30, 2018
- N. R. D. P. Astuti, I. Arfiani, and E. Aribowo, “Analysis of the security level of modified CBC algorithm cryptography using avalanche effect Analysis of the security level of modified CBC algorithm cryptography using avalanche effect,” pp. 2–10, 2019, doi: 10.1088/1757-899X/674/1/012056
- S. A. Mehdi and Z. L. Ali, “Image Encryption Algorithm Based on a Novel Six-Dimensional Hyper- Chaotic System,” Al-Mustansiriyah J. Sci., vol. 31, no. 1, p. 54, 2020, doi: 10.23851/mjs.v31i1.739
- S. Muhajer, A. Monem, and S. Rahma, “A novel approach for the development of the Twofish algorithm based on multi-level key space,” J. Inf. Secur. Appl., vol. 50, p. 102410, 2020, doi: 10.1016/j.jisa.2019.102410
- R. Munir, “Algoritma Enkripsi Citra Digital Berbasis Chaos dengan Penggabungan Teknik Permutasi dan Teknik Substitusi Menggunakan Arnold Cat Map dan Logistic Map,” vol. 1, pp. 166–181, 2012
Last update:
No citation recorded.
Last update: 2025-04-03 09:09:48
No citation recorded.
Copyright (c) 2022 JURNAL MASYARAKAT INFORMATIKA

This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
The authors who submit the manuscript must understand that the article's copyright belongs to the author(s) if accepted for publication. However, the author(s) grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Authors should also understand that their article (and any additional files, including data sets, and analysis/computation data) will become publicly available once published under that license. See our copyright policy. By submitting the manuscript to Jmasif, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
- their article is original, written by the mentioned author(s),
- has never been published before,
- does not contain statements that violate the law, and
- does not violate the rights of others, is subject to copyright held exclusively by the author(s), is free from the rights of third parties, and the necessary written permission to quote from other sources has been obtained by the author(s).
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
- Copyright and other proprietary rights related to the article, such as patents,
- The right to use the substance of the article in its own future works, including lectures and books,
- The right to reproduce the article for its own purposes,
- The right to archive all versions of the article in any repository, and
- The right to enter into separate additional contractual arrangements for the non-exclusive distribution of published versions of the article (for example, posting them to institutional repositories or publishing them in a book), acknowledging its initial publication in this journal (Jurnal Masyarakat Informatika).
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. Jmasif will not be held responsible for anything arising because of the writer's internal dispute. Jmasif will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. Jmasif allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and Jmasif to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.