2019
DOI: 10.3390/photonics6040121
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption and Decryption Systems Using the Jigsaw Transform and the Iterative Finite Field Cosine Transform

Abstract: We propose the use of the Jigsaw transform (JT) and the iterative cosine transform over a finite field in order to encrypt and decrypt images. The JT is a nonlinear operation that allows one to increase the security over the encrypted images by adding new keys to the encryption and decryption systems. The finite field is a finite set of integer numbers where the basic mathematical operations are performed using modular arithmetic. The finite field used in the encryption and decryption systems has an order give… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
10
0
2

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 20 publications
1
10
0
2
Order By: Relevance
“…In cryptography, the finite field called GF (p) is an important field, where p is a prime number. It is a finite set of integers and uses mode operations to perform basic mathematical operations [52]. is study uses a finite field, GF(257) � 0, 1, .…”
Section: Diffusion Based On Finite Fields Gf (257)mentioning
confidence: 99%
“…In cryptography, the finite field called GF (p) is an important field, where p is a prime number. It is a finite set of integers and uses mode operations to perform basic mathematical operations [52]. is study uses a finite field, GF(257) � 0, 1, .…”
Section: Diffusion Based On Finite Fields Gf (257)mentioning
confidence: 99%
“…For this, we encrypted 2 images, image number 6 from the healthy patients and image number 15 from the sick subset. We used subsections of 16 × 16 for the Jigsaw transform, a cyclic permutation of 2005 columns and 2007 rows, 4 9 sections for Langton's ant (placing the ants of the red channels on the first row and second column, the ants of the green channels on the second row and second column, and the ants of the blue channels on the third row and second column) and p 1 = 530, 530, p 2 = 120, 120, p 3 = 350, 350 as the parameters for the second deterministic noise. The results obtained are shown in Figures 12 and 13, respectively.…”
Section: Encryption Resultsmentioning
confidence: 99%
“…For example, if we use a 4224 × 3616 RGB picture and divide it in sections of 16 × 16 for the Jigsaw transform and into 4 9 sections for Langton's ant, then K > 1 × 10 1134190. 38 .…”
Section: Keyspacementioning
confidence: 99%
See 1 more Smart Citation
“…The Jigsaw transform [34] is a non-linear transposition function that alternates the adjacent blocks of an image [35]. One of the Jigsaw transform features is the unitary conservation of the energy during the transformation process.…”
Section: A Three-dimensional Jigsaw Transform (3d-jst)mentioning
confidence: 99%