Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology

Authors

  • Dafik 1PUI-PT Combinatorics and Graph, CGANT-University of Jember, Indonesia; 2Department of Mathematics, University of Jember, Indonesia
  • Swaminathan Venkatraman Department of Mathematics, School of Arts, Sciences, Humanities and Education, SASTRA Deemed University, Thanjavur, India
  • G. Sathyanarayanan Department of Mathematics, Srinivasa Ramanujan Centre, School of Arts, Sciences, Humanities and Education, SASTRA Deemed University, Thanjavur, India
  • Rifki Ilham Baihaki PUI-PT Combinatorics and Graph, CGANT-University of Jember, Indonesia
  • Indah Lutfiyatul Mursyidah PUI-PT Combinatorics and Graph, CGANT-University of Jember, Indonesia
  • Ika Hesti Agustin 1PUI-PT Combinatorics and Graph, CGANT-University of Jember, Indonesia; 2Department of Mathematics, University of Jember, Indonesia

DOI:

https://doi.org/10.19139/soic-2310-5070-2310

Keywords:

Hypergraph, crypthography, cipher block chaining, text security

Abstract

Message security remains a vital concern in cryptography. This paper introduces a novel enhancement to the classical Caesar cipher by generating a keystream from a Hyper-Ladder Graph, which combines hypergraph and ladder graph properties to produce complex and unpredictable patterns. The proposed method is evaluated against AES, DES, ChaCha20, and XChaCha20, showing superior performance in encryption time and memory efficiency, especially in constrained environments. To demonstrate broader applicability, we implemented the keystream in grayscale image watermarking. The binary keystream was first encrypted using RSA public key encryption, then embedded using the least significant bit (LSB) method. The results showed high imperceptibility with a PSNR of 57.05 dB and an SSIM of 0.9989. This integration of graph-based keystream and asymmetric cryptography offers robust security and flexibility, making it suitable for various domains such as secure text encryption, digital watermarking, and document authentication.

Downloads

Published

2025-04-29

Issue

Section

Research Articles

How to Cite

Enhancing Text Encryption and Secret Document Watermarking through Hyperladder Graph-Based Keystream Construction on Asymmetric Cryptography Technology. (2025). Statistics, Optimization & Information Computing, 14(1), 247-263. https://doi.org/10.19139/soic-2310-5070-2310

Most read articles by the same author(s)

1 2 > >>