Author:
Al-Saffar, N. F. H.,Alkhayyat, H. K. H.,Obaid, Z. K.
Abstract
To prevent sensitive images shared on social media from being stolen, researchers are seeking to find and innovate image encryption algorithms. Since attackers attempt to exploit it to access encrypted images, the problem of generating keys as the first stage of any encryption algorithm is regarded as a critical problem. This issue was dealt with in this paper through the use of the logistic map. This map must be calculated using specific conditions and special parameters to maintain its chaos. The Diffie-Hellman key exchange algorithm was modified to address this problem since the shared keys now consist of a 16-element vector. The first two elements will be used for a logistic map. The entire vector was used to create a self-invertible matrix. The encryption level entails two operations: the first is matrix multiplication with a vector, and the second is a bitwise XOR
operation between two matrices. A proposed encryption algorithm is capable of producing encrypted images that are challenging to decrypt through the use of stringent security tests. The outcomes of each test show how well the proposed encryption algorithm performs compared with other algorithms and how to resist the attacks.
Publisher
Universiti Putra Malaysia
Reference36 articles.
1. A. Abdallah & A. K. Farhan (2022). A new image encryption algorithm based on multi chaotic system. Iraqi Journal of Science, 63(1), 324–337. https://doi.org/10.24996/ijs.2022.63.1.31.
2. B. Acharya, G. S. Rath, S. K. Patra & S. K. Panigrahy (2007). Novel methods of generating self-invertible matrix for Hill Cipher algorithm. International Journal of Security, 1(1), 14–21.
3. M. Alawida (2023). A novel chaos-based permutation for image encryption. Journal of King Saud University-Computer and Information Sciences, 35(6), Article ID: 101595. https://doi.org/10.1016/j.jksuci.2023.101595.
4. J. R. Aparna & S. Ayyappan (2015). Imagewatermarking using Diffie Hellman key exchange algorithm. Procedia Computer Science, 46, 1684–1691. https://doi.org/10.1016/j.procs.2015.02.109.
5. A. Arab, M. J. Rostami & B. Ghavami (2019). An image encryption method based on chaos system and AES algorithm. The Journal of Supercomputing, 75, 6663–6682. https://doi.org/10.1007/s11227-019-02878-7.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献