• Widhi Bagus Nugroho Informatics Engineering, University Dian Nuswantoro, Indonesia
  • Ajib Susanto Informatics Engineering, University Dian Nuswantoro, Indonesia
  • Christy Atika Sari Informatics Engineering, University Dian Nuswantoro, Indonesia
  • Eko Hari Rachmawanto Informatics Engineering, University Dian Nuswantoro, Indonesia
  • Mohamed Doheir Universiti Teknikal Malaysia Melaka, Malaysia
Keywords: Cryptography, Chacha20, MSE, NPCR, PSNR, UACI


In the current era, data security is mandatory because it protects our personal data from being used by irresponsible people. The objective of this research is to show the robustness of the method we propose to encrypt images using the chacha20 algorithm which is included in the symmetric encryption cryptography technique and uses one key for both encryption and decryption processes. we use the encryption method by reading the bits from a digital image which is processed using the chacha20 algorithm to get the results of the digital image encryption. The results of this study indicate that the Chacha20 algorithm is secure to use when encrypting and decrypting digital images. The average MSE value generated by the chacha20 algorithm is 0.1232. The average PSNR value is 57.4784. The average value of UACI is 49.99%. The average value of NPCR is 99.602%. The test values were acquired by executing encryption and decryption processes on 5 distinct colour digital images with different size. Additionally, this study displays histograms for the original digital image, as well as for the encrypted and decrypted digital images, illustrating the pixel distribution in each. The histogram also serves as material for analysis of the success of the encryption and decryption processes in digital images.


Download data is not yet available.


A. Tiwari, G. Shankar, B. Bhusan Jain, and Mt. Scholar, “Comparative Analysis of Different Steganography Technique for Image Security,” International Journal of Engineering Trends and Applications (IJETA), vol. 8, no. 2, pp. 6–9, 2021, doi: 10.33144/23939516/IJETA-V8I2P2.

D. Sinaga, E. H. Rachmawanto, C. A. Sari, D. R. I. M. Setiadi, and N. A. Setiyanto, “An Enhancement of Data Hiding Imperceptibility using Slantlet Transform (SLT),” Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, pp. 87–98, Nov. 2018, doi: 10.22219/kinetik.v4i1.702.

C. A. Sari, M. H. Dzaki, E. H. Rachmawanto, R. R. Ali, and M. Doheir, “High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 4, pp. 568–580, 2023, doi: 10.22266/ijies2023.0831.46.

A. A. Rashid and K. A. Hussein, “Image encryption algorithm based on the density and 6D logistic map,” International Journal of Electrical and Computer Engineering, vol. 13, no. 2, pp. 1903–1913, Apr. 2023, doi: 10.11591/ijece.v13i2.pp1903-1913.

C. AtikaSari, D. W. Utomo, and M. A. S. Doheir, “Visual Analysis Based on CMY and RGB Image Cryptography Using Vigenere and Beaufort Cipher,” Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, May 2023, doi: 10.22219/kinetik.v8i2.1664.

R. Imam, Q. M. Areeb, A. Alturki, and F. Anwer, “Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status,” IEEE Access, vol. 9. Institute of Electrical and Electronics Engineers Inc., pp. 155949–155976, 2021. doi: 10.1109/ACCESS.2021.3129224.

M. Salih Mahdi, R. Abdulaali Azeez, and N. Falih Hassan, “A proposed lightweight image encryption using ChaCha with hyperchaotic maps,” Periodicals of Engineering and Natural Sciences, vol. 8, no. 4, pp. 2138–2145, 2020, doi: 10.21533/pen.v8i4.1708.

J. Waleed, A. Noori Mazher, and A. Tariq MaoLood, “Developed Lightweight Cryptographic Algorithms for The Application of Image Encryption: A Review,” Journal of Al-Qadisiyah for Computer Science and Mathematics, vol. 13, no. 2, p. 11, 2021, doi: 10.29304/jqcm.2021.13.2.788.

A. T. Maolood, E. K. Gbashi, and E. S. Mahmood, “Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map,” International Journal of Electrical and Computer Engineering, vol. 12, no. 5, pp. 4988–5000, Oct. 2022, doi: 10.11591/ijece.v12i5.pp4988-5000.

A. R. Alawi and N. F. Hassan, “A Proposal Video Encryption Using Light Stream Algorithm,” Engineering and Technology Journal, vol. 39, no. 1B, pp. 184–196, Mar. 2021, doi: 10.30684/etj.v39i1b.1689.

M. H. Taha and J. M. Al-Tuwaijari, “Improvement of Chacha20 algorithm based on tent and Chebyshev chaotic maps,” Iraqi Journal of Science, vol. 62, no. 6, pp. 2029–2039, Jul. 2021, doi: 10.24996/ijs.2021.62.6.29.

S. M. S. Reza et al., “Salsa20 based lightweight security scheme for smart meter communication in smart grid,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 18, no. 1, pp. 228–233, Feb. 2020, doi: 10.12928/TELKOMNIKA.V18I1.14798.

Y. Q. Zhang, J. L. Hao, and X. Y. Wang, “An Efficient Image Encryption Scheme Based on S-Boxes and Fractional-Order Differential Logistic Map,” IEEE Access, vol. 8, pp. 54175–54188, 2020, doi: 10.1109/ACCESS.2020.2979827.

L. E. Kane, J. J. Chen, R. Thomas, V. Liu, and M. McKague, “Security and Performance in IoT: A Balancing Act,” IEEE Access, vol. 8, pp. 121969–121986, 2020, doi: 10.1109/ACCESS.2020.3007536.

O. Dişkaya, E. Avaroğlu, H. Menken, and A. Emsal, “A New Encryption Algorithm Based on Fibonacci Polynomials and Matrices,” Traitement du Signal, vol. 39, no. 5, pp. 1453–1462, Nov. 2022, doi: 10.18280/ts.390501.

G. Shengtao, W. Tao, W. Shida, Z. Xuncai, and N. Ying, “A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits,” IEEE Photonics J, vol. 13, no. 1, Feb. 2021, doi: 10.1109/JPHOT.2020.3044222.

P. Parida, C. Pradhan, X. Z. Gao, D. S. Roy, and R. K. Barik, “Image Encryption and Authentication with Elliptic Curve Cryptography and Multidimensional Chaotic Maps,” IEEE Access, vol. 9, pp. 76191–76204, 2021, doi: 10.1109/ACCESS.2021.3072075.

M. K. Hussein, K. R. Hassan, and H. M. Al-Mashhadi, “The quality of image encryption techniques by reasoned logic,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 18, no. 6, pp. 2992–2998, Dec. 2020, doi: 10.12928/TELKOMNIKA.v18i6.14340.

W. Jang and S.-Y. Lee, “Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment,” Int J Distrib Sens Netw, vol. 16, no. 3, p. 155014772091477, Mar. 2020, doi: 10.1177/1550147720914779.

S. A. Mehdi and Z. latif Ali, “Image Encryption Algorithm Based on a Novel Six-Dimensional Hyper- Chaotic System,” Al-Mustansiriyah Journal of Science, vol. 31, no. 1, pp. 54–63, Mar. 2020, doi: 10.23851/mjs.v31i1.739.

S. A. Shawkat and I. Al-Barazanchi, “A proposed model for text and image encryption using different techniques,” Telkomnika (Telecommunication Computing Electronics and Control), vol. 20, no. 4, pp. 858–866, Aug. 2022, doi: 10.12928/TELKOMNIKA.v20i4.23367.

A. A. Alhijaj and M. Kamil Hussein, “Stereo Images Encryption by OSA & RSA Algorithms,” J Phys Conf Ser, vol. 1279, no. 1, p. 012045, Jul. 2019, doi: 10.1088/1742-6596/1279/1/012045.

X. Xue, D. Zhou, and C. Zhou, “New insights into the existing image encryption algorithms based on DNA coding,” PLoS One, vol. 15, no. 10, Oct. 2020, doi: 10.1371/journal.pone.0241184.

S. T. Kamal, K. M. Hosny, T. M. Elgindy, M. M. Darwish, and M. M. Fouda, “A new image encryption algorithm for grey and color medical images,” IEEE Access, vol. 9, pp. 37855–37865, 2021, doi: 10.1109/ACCESS.2021.3063237.

X. Huang, Y. Dong, G. Ye, W. S. Yap, and B. M. Goi, “Visually meaningful image encryption algorithm based on digital signature,” Digital Communications and Networks, vol. 9, no. 1. KeAi Communications Co., pp. 159–165, Feb. 01, 2023. doi: 10.1016/j.dcan.2022.04.028.

How to Cite
W. B. Nugroho, A. Susanto, C. A. Sari, E. H. Rachmawanto, and M. Doheir, “A ROBUST AND IMPERCEPTIBLE FOR DIGITAL IMAGE ENCRYPTION USING CHACHA20”, J. Tek. Inform. (JUTIF), vol. 5, no. 2, pp. 397-404, Apr. 2024.