2018
DOI: 10.11591/ijeecs.v11.i2.pp496-503
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Schema of a Special Permutation Inside of Each Pixel of an Image for its Encryption

Abstract: <p>The developments of communications and digital transmissions have pushed the data encryption to grow quickly to protect the information, against any hacking or digital plagiarisms. Many encryption algorithms are available on the Internet, but it's still illegal to use a number of them. Therefore, the search for new the encryption algorithms is still current. In this work, we will provide a preprocessing of the securisation of the data, which will significantly enhance the crypto-systems. Firstly, we d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Increasing the security of any encryption algorithm requires increasing the degree of complexity through adding some additional processes, complex operations, increasing the number of rounds, and so on [14][15][16][17]. is will increase the encryption process time which leads to reduce the algorithm speed [18][19][20]. On the other hand, increasing the encryption process speed requires reducing complexity degree which in turn affects the security level [3,21].…”
Section: Introductionmentioning
confidence: 99%
“…Increasing the security of any encryption algorithm requires increasing the degree of complexity through adding some additional processes, complex operations, increasing the number of rounds, and so on [14][15][16][17]. is will increase the encryption process time which leads to reduce the algorithm speed [18][19][20]. On the other hand, increasing the encryption process speed requires reducing complexity degree which in turn affects the security level [3,21].…”
Section: Introductionmentioning
confidence: 99%
“…This proposed technique can be used in secured image encryption [12] and authentication in wireless network [13]. In Table 1, data has been collected on the basis of two out of three parameters of the tree parity machines were kept static and fluctuating the third parameter.…”
Section: Results and Interpretationmentioning
confidence: 99%
“…The fundamental concept of MLP based key exchange protocol focuses mostly on two key attributes of MLP. This technique can be used in secured image encryption [19] and authentication in wireless network [20]. Firstly, two nodes coupled over a public channel will synchronize even though each individual network exhibits disorganized behavior.…”
Section: Security Issuementioning
confidence: 99%