2020
DOI: 10.22266/ijies2020.1231.12
|View full text |Cite
|
Sign up to set email alerts
|

A Combination of Block-Based Chaos with Dynamic Iteration Pattern and Stream Cipher for Color Image Encryption

Abstract: This research proposes an encryption method on images using a combination of chaotic methods, streams, and hash functions. SHA-1 is used as a hash function to encrypt key inputs to be more secure and can produce more dynamic keys at chaotic and stream encryption stages. Chaos encryption is done by dividing the image into small blocks where each encrypted block differs based on a dynamic key pattern based on chaotic keys. At the last stage, all blocks are made as whole images again to be encrypted by the stream… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 0 publications
0
12
0
Order By: Relevance
“…Encryption is one way of securing data and is currently one of the interesting studies to study. Actually all digital data can be encrypted, but encryption research on image data has become the most conducted [2,3]. Encryption in digital images has different characteristics when compared to text encryption.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Encryption is one way of securing data and is currently one of the interesting studies to study. Actually all digital data can be encrypted, but encryption research on image data has become the most conducted [2,3]. Encryption in digital images has different characteristics when compared to text encryption.…”
Section: Introductionmentioning
confidence: 99%
“…In many studies of encryption literature on digital images, the use of chaos systems is widely combined with various other encryption methods to improve message security. But if you look specifically, some research proposes a block-based encryption technique based on a chaos system as in the research [3,18]. The block-based technique is done by dividing the image into smaller blocks, then encrypting each block.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Cryptography is the study of data encryption to secure data. In this way, the encrypted data can change its form and meaning so that it cannot be read by unauthorized persons [4][5][6]. The encryption process is one of the main processes in cryptography, this process is carried out on the sender's side.…”
Section: Introductionmentioning
confidence: 99%
“…But the OTP method depends on the quality of the key, where the key used must be completely random and used only once, besides that the operation is also very simple, namely the XOR operation. Whereas many theories agree that the chaos method has several advantages including diffusion and confusion so that it is resistant to differential attacks [6,18,19,21], however, if the chaotic method alone cannot produce a uniform histogram, it will be the same as the original because the chaotic method is a type of encryption that only randomizes the position of the pixels in the image. So that eventually many studies combine these types of encryption to increase security [11,[22][23][24].…”
Section: Introductionmentioning
confidence: 99%