首页    期刊浏览 2024年11月24日 星期日
登录注册

文章基本信息

  • 标题:A New Cryptographic Strategy for Digital Images
  • 其他标题:A New Cryptographic Strategy for Digital Images
  • 作者:Nidhi Sethi ; Sandip Vijay
  • 期刊名称:International Journal of Electrical and Computer Engineering
  • 电子版ISSN:2088-8708
  • 出版年度:2014
  • 卷号:4
  • 期号:3
  • 页码:456-462
  • 语种:English
  • 出版社:Institute of Advanced Engineering and Science (IAES)
  • 摘要:In this paper, a new image block cipher encryption strategy for gray scale images using a different set of secret key and sizes is proposed. Initially, the swapping and dispersion is done without keys and in second stage the image is mixed with the chirikov map involving first secret key. 'N' rounds are taken to complete this process. The blended image is divided into blocks of block size 8X8.These blocks are also swapped to achieve good confusion. For making the encryption scheme more sturdy in each block the transmutation of pixels is done with the modified logistic map having three more secret keys. The proposed scheme is simple, rapid and sensitive to the secret key. Due to the high order of substitution, common attacks such as linear and differential cryptanalysis are unattainable. The experimental results show that the proposed encryption technique is effective and has high security features.DOI:http://dx.doi.org/10.11591/ijece.v4i3.6325
  • 其他摘要:In this paper, a new image block cipher encryption strategy for gray scale images using a different set of secret key and sizes is proposed. Initially, the swapping and dispersion is done without keys and in second stage the image is mixed with the chirikov map involving first secret key. 'N' rounds are taken to complete this process. The blended image is divided into blocks of block size 8X8.These blocks are also swapped to achieve good confusion. For making the encryption scheme more sturdy in each block the transmutation of pixels is done with the modified logistic map having three more secret keys. The proposed scheme is simple, rapid and sensitive to the secret key. Due to the high order of substitution, common attacks such as linear and differential cryptanalysis are unattainable. The experimental results show that the proposed encryption technique is effective and has high security features. DOI: http://dx.doi.org/10.11591/ijece.v4i3.6325
Loading...
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有