2021
DOI: 10.11591/ijece.v11i5.pp3996-4007
|View full text |Cite
|
Sign up to set email alerts
|

Extended of TEA: A 256 bits block cipher algorithm for image encryption

Abstract: <p>This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The attacker sees the system output as random due to the unexpected behavior. But it appears predictable to the receiver, allowing decryption [13]- [16].…”
Section: Cryptography and Chaotic Systemmentioning
confidence: 99%
“…The attacker sees the system output as random due to the unexpected behavior. But it appears predictable to the receiver, allowing decryption [13]- [16].…”
Section: Cryptography and Chaotic Systemmentioning
confidence: 99%
“…software and hardware). − Implementation: the AES algorithm is flexible as it can be executed on any platform [2].…”
Section: Advanced Encryption Standard Internal Structurementioning
confidence: 99%
“…When the algorithm requires a hash value, even a small change in the plain text input string will considerably alter the hash value. Consequently, the property after altering only 1 bit in the plain text may be changed; in such a case, any modified result can be inspected as a minimum-half of the bits in the output cipher text [2].…”
Section: Avalanche Effectmentioning
confidence: 99%
See 1 more Smart Citation
“…Full encryption and partial encryption are the two methods used for protecting an image from leakage and eavesdropping. The entire image encryption is carried out when it is essential to execute encryption efficiently and rapidly [3,4]. However, selective encryption is the process of encrypting the selected part from the main image.…”
Section: Introductionmentioning
confidence: 99%