Image cryptosystem with image key using integral disproportion
Abstract
Keywords
Full Text:
PDFReferences
Madhu, S., & Hussain, M. A. Securing Medical Images by Image Encryption using Key Image. International Journal of Computer Applications, 2014, vol. 104, iss. 3, pp. 30-34. DOI: 10.5120/18184-9079.
Makarichev, V., Lukin, V., Illiashenko, O., & Kharchenko, V. Digital Image Representation by Atomic Functions: The Compression and Protection of Data for Edge Computing in IoT Systems. Sensors, 2022, vol. 22, iss. 10, article no. 3751. DOI: 10.3390/s22103751.
Albahadily, H. K., Altaay, A. A. J., & Jabbar, I. A. Encryption of Military Maps Images Using Peter De Jong Chaotic Maps and Lightwaght Encryption. 2022 Fifth College of Science International Conference of Recent Trends in Information Technology (CSCTIT), Baghdad, IEEE, 2022, pp. 137-142. DOI: 10.1109/CSCTIT56299.2022.10145728.
Madhu, S., Hussain, M. A., Leelavathy, N., & Sujatha, B. Development of Secure and Novel Methods of Image Encryption Using an Image as Key. Research Highlights in Mathematics and Computer Science Vol. 7, 2023, pp. 89-102. DOI: 10.9734/bpi/rhmcs/v7/4297E.
Archana, N., Manogna, S., Hussain, D. M. A., & Razia, D. S. Secure Sharing of Documents using Image Encryption and Key Image. International Journal of Recent Technology and Engineering (IJRTE), 2019, vol. 8, iss. 4, pp. 9415-9419. DOI: 10.35940/ijrte.D9724.118419.
Zeghid, M., Machhout, M., Khriji, L., Baganne, A., & Tourki, R. A Modified AES Based Algorithm for Image Encryption. International Journal on Computer Science and Engineering, 2007, vol. 1, iss. 1, pp. 745-750. DOI: 10.5281/zenodo.1334059.
Ye, G., Jiao, K., Huang, X., Goi, B., & Yap, W. An image encryption scheme based on public key cryptosystem and quantum logistic map. Scientific Reports, 2020, vol. 10, iss. 1, pp. 21044. DOI: 10.1038/s41598-020-78127-2.
Neamah, A. A., & Shukur, A. A. A Novel Conservative Chaotic System Involved in Hyperbolic Functions and Its Application to Design an Efficient Colour Image Encryption Scheme. Symmetry, 2023, vol. 15, iss. 8, article no. 1511. DOI: 10.3390/sym15081511.
Li, M., Fang, X., & Ernest, A. A Color Image Encryption Method Based on Dynamic Selection Chaotic System and Singular Value Decomposition. Mathematics, 2023, vol. 11, iss. 15, article no. 3274. DOI: 10.3390/math11153274.
Hussain, A. Z., & Khodher, M. A. A. Medical image encryption using multi chaotic maps. TELKOMNIKA (Telecommunication Computing Electronics and Control), 2023, vol. 21, iss. 3, article no. 556. DOI: 10.12928/telkomnika.v21i3.24324.
Choi, U. S., Cho, S. J., & Kang, S. W. New Color Image Encryption for Medical Images Based on Three Dimensional Generalized Chaotic Cat Map and Combined Cellular Automata. Advances in Science, Technology and Engineering Systems Journal, 2020, vol. 5, iss. 2, pp. 104-110. DOI: 10.25046/aj050213.
Hryshchuk, R., & Hryshchuk, O. A GENERALIZED MODEL OF FREDHOLM'S CRYPTOSYSTEM. Cybersecurity: Education Science Technique, 2019, vol. 4, iss. 4, pp. 14-23. DOI: 10.28925/2663-4023.2019.4.1423. (In Ukrainian)/
Kari, A. P., Navin, A. H., Bidgoli, A. M., & Mirnia, M. A new image encryption scheme based on hybrid chaotic maps. Multimedia Tools and Applications, 2021, vol. 80, iss. 2, pp. 2753-2772. DOI: 10.1007/s11042-020-09648-1.
Dawood, A., Thabit, Q., & Fahad, T. A Comprehensive Review of Color Image Encryption Technology. Basrah journal for engineering science, 2023, vol. 23, iss. 1, pp. 56-63. DOI: 10.33971/bjes.23.1.8.
Zhou, Y., Panetta, K., & Agaian, S. Image encryption using binary key-images. 2009 IEEE International Conference on Systems, Man and Cybernetics, San Antonio, IEEE, 2009, pp. 4569-4574. DOI: 10.1109/ICSMC.2009.5346780.
Zhou, Y., Cao, W., & Chen, C. L. P. Image encryption using binary bitplane. Signal Processing, 2014, vol. 100, pp. 197-207. DOI: 10.1016/j.sigpro.2014.01.020.
Somaraj, S., & AliHussain, M. An Image Encryption Technique Using Scan Based Approach and Image as Key. Advances in Intelligent Systems and Computing, 2017, vol. 507, pp. 645-653. DOI: 10.1007/978-981-10-2471-9_62.
Somaraj, S., & Hussain, M. A. A Novel Image Encryption Technique Using RGB Pixel Displacement for Color Images. 2016 IEEE 6th International Conference on Advanced Computing (IACC), Bhimavaram, IEEE, 2016, pp. 275-279. DOI: 10.1109/IACC.2016.59.
Somaraj, S., & Hussain, M. A. Performance and Security Analysis for Image Encryption using Key Image. Indian Journal of Science and Technology, 2015, vol. 8, iss. 35, pp. 1-4. DOI: 10.17485/ijst/2015/v8i35/73141.
Avramenko, V., & Demianenko, V. Serial encryption using the functions of real variable. Radioelectronic and computer systems, 2021, no. 2, pp. 39-50. DOI: 10.32620/reks.2021.2.04.
Karpenko, A. P. Integral'nye kharakteristiki neproportsional'nosti chislovykh funktsii i ikh primenenie v diagnostike [Integral characteristics of disproportionality of numerical functions and their application in diagnostics]. Visnyk Sums'koho derzhavnoho universytetu – Newsletter of Sumy State University, 2000, vol. 16, pp. 20-25. Available at: https://essuir.sumdu.edu.ua/bitstream-download/123456789/10931/1/4_Karpenko.pdf (accessed Jan. 3, 2024) (In Russian).
Avramenko, V., Bondarenko, M. Using the Sum of Real Type Functions to Encrypt Messages. CEUR Workshop Proceedings, 2021, vol. 3200, pp. 10-17.
DOI: https://doi.org/10.32620/reks.2024.2.12
Refbacks
- There are currently no refbacks.