Image Encryption Techniques Using Dynamic Approach : An Article Review

Author:

Shuker Dr. WisamORCID,Kubba Zaid M. Jawad,Badrulddin Ahmed,Mohammed Uliyan Diaa

Abstract

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabrication of the S-box has a very large key space as it depends on the user's key. The encryption-decryption method allows changing pixel positions with the help of dynamically generated S-boxes, images, videos, etc. Thus, the study shows that a new method of S-boxes for dynamic cipher algorithms can be easily generated and applied to image encryption.

Publisher

College of Education for Pure Science (Ibn Al-Haitham)

Subject

Microbiology

Reference18 articles.

1. Ge, X., et al., Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Transactions on Dependable and Secure computing, 2019. 18(1): p. 490-504.

2. Fernando, E., et al. Performance comparison of symmetries encryption algorithm AES and DES with raspberry pi. in 2019 International Conference on Sustainable Information Engineering and Technology (SIET). 2019. IEEE.

3. Shukur, W.A., A proposed method for generating a private key using digital color image. International Journal of Applied Engineering Research, 2017. 12(16): p. 6235-6240.

4. Sankpal, P.R., Vijaya, P.A., "Image Encryption Using Chaotic Maps: A Survey", Fifth International Conference on Signal and Image Processing, 8-10 January 2014, Jeju Island, pp.102-107, DOI: 10.1109/ ICSIP.2014.80.

5. Kubba, Z.M.J. and H.K. Hoomod. A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System. in 2019 First International Conference of Computer and Applied Sciences (CAS). 2019. IEEE.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3