2022
DOI: 10.3991/ijim.v16i17.34335
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Based on Multi-Level Keys on RC5 Algorithm

Abstract: In recent years, the need to develop encryption algorithms has led to an increase in the working and efficiency of algorithms to protect the transmission and reception of information from any security breach. The RC5 type encryption algorithm is the most common and closest to perfection and symmetry algorithms, knowing that it faces many problems in which data collection was limited because it occurs only twice by working on its also, the algorithm is used for only 1 function (XOR) through the encryption proce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…In addition, the number of bytes (b) with values ranging from 0 to 255 specifies the security key. Encryption, decryption and key generation are the three elements of RC5 [38].…”
Section: Rivest Ciphermentioning
confidence: 99%
“…In addition, the number of bytes (b) with values ranging from 0 to 255 specifies the security key. Encryption, decryption and key generation are the three elements of RC5 [38].…”
Section: Rivest Ciphermentioning
confidence: 99%
“…Facets of the image are retrieved after the pre-processing stage. The retrieved features are often divided into two groups: global features, or features based on appearance, and local features, or features based on geometry [30][31][32][33]. Instead of extracting characteristics from individual face points, the appearance-based method extracts features from the entire face.…”
Section: Feature Extractionmentioning
confidence: 99%
“…Cryptography is used to store information on the blockchin on the ledger. Blockchain makes use of some cryptography building blocks, such as public key, private key, and hash function [12,[31][32][33][34].…”
Section: Fig 2 Block Chain Implementationmentioning
confidence: 99%