Multiple image encryption acting at the RNA level
Vol 7, Issue 1, 2024
VIEWS - 285 (Abstract) 240 (PDF)
Abstract
Keywords
Full Text:
PDFReferences
1. JarJar A. Vigenere and genetic cross-over acting at the restricted ASCII code level for color image encryption. Medical & Biological Engineering & Computing. 2022, 60(7): 2077-2093. doi: 10.1007/s11517-022-02566-4
2. Qobbi Y, Jarjar A, Essaid M, et al. New Image Encryption Scheme Based on Dynamic Substitution and Hill Cipher. WITS 2020. Published online July 22, 2021: 797-808. doi: 10.1007/978-981-33-6893-4_72
3. Jarjar A. Improvement of hill’s classical method in image cryptography. International Journal of Statistics and Applied Mathematics. 2017, 2(3 Part A).
4. Jarjar M, Najah S, Zenkouar K, et al. Further improvement of the HILL method applied in image encryption. In: Proceedings of 2020 1st international conference on innovative research in applied science, engineering and technology (IRASET); 16–19 April 2020; Meknes, Morocco. pp. 1–6. doi: 10.1109/IRASET48871.2020.9092046
5. Hraoui S, Gmira F, Jarar AO, et al. Benchmarking AES and chaos based logistic map for image encryption. 2013 ACS International Conference on Computer Systems and Applications (AICCSA). Published online May 2013. doi: 10.1109/aiccsa.2013.6616441
6. Kiran, Parameshachari BD, Panduranga HT. Medical Image Encryption Using SCAN Technique and Chaotic Tent Map System. Recent Advances in Artificial Intelligence and Data Engineering. Published online November 1, 2021: 181-193. doi: 10.1007/978-981-16-3342-3_15
7. Liu Z, Zhu D, Zhou C, et al. Chaotic image encryption method based on Zigzag scrambling and DNA coding. 2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC). Published online December 2, 2022. doi: 10.1109/icftic57696.2022.10075195
8. Hoang TM. A novel design of multiple image encryption using perturbed chaotic map. Multimedia Tools and Applications. 2022, 81(18): 26535-26589. doi: 10.1007/s11042-022-12139-0
9. Xu L, Zhang J. A Novel four - Wing chaotic system with multiple attractors based on hyperbolic sine: Application to image encryption*. Integration. 2022, 87: 313-331. doi: 10.1016/j.vlsi.2022.07.012
10. Abdallah AA, Farhan AK. A New Image Encryption Algorithm Based on Multi Chaotic System. Iraqi Journal of Science. Published online January 30, 2022: 324-337. doi: 10.24996/ijs.2022.63.1.31
11. Suzaki T, Minematsu K. Improving the Generalized Feistel. Lecture Notes in Computer Science. Published online 2010: 19-39. doi: 10.1007/978-3-642-13858-4_2
12. JarJar A. Improvement of Feistel method and the new encryption scheme. Optik. 2018, 157: 1319-1324. doi: 10.1016/j.ijleo.2017.12.065
13. Abid A, Qobbi Y, Benazzi A, et al. Two Enhanced Feistel Steps for Medical Image Encryption. 2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS). Published online December 1, 2022. doi: 10.1109/icecocs55148.2022.9982938
14. Ge R, Yang G, Wu J, et al. A Novel Chaos-Based Symmetric Image Encryption Using Bit-Pair Level Process. IEEE Access. 2019, 7: 99470-99480. doi: 10.1109/access.2019.2927415
15. Shah A. Enhancing Security of Vignere Cipher using Modified RC4. International Journal of Computer Applications. 2016, 136(5): 38-41. doi: 10.5120/ijca2016908428
16. Zhang L, Zhang X. Multiple-image encryption algorithm based on bit planes and chaos. Multimedia Tools and Applications. 2020, 79(29-30): 20753-20771. doi: 10.1007/s11042-020-08835-4
17. Zhang Y, He Y, Zhang J, et al. Multiple Digital Image Encryption Algorithm Based on Chaos Algorithm. Mobile Networks and Applications. 2022, 27(4): 1349-1358. doi: 10.1007/s11036-022-01923-9
18. Zhang X, Wang X. Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimedia Tools and Applications. 2018, 78(6): 7841-7869. doi: 10.1007/s11042-018-6496-1
19. Abd Ali SM, Hasan HF. Novel encryption algorithm for securing sensitive information based on feistel cipher. Test Engeenering Managenment. 2019. 19(80): 10-16.
20. Alexan W, Alexan N, Gabr M. Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs. Fractal and Fractional. 2023, 7(4): 287. doi: 10.3390/fractalfract7040287
21. Kumari M, Pawar V, Kumar P. A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique. International Journal of Network Security & Its Applications. 2019, 11(4): 49-73. doi: 10.5121/ijnsa.2019.11404
22. Kumar Patro KA, Acharya B. An efficient colour image encryption scheme based on 1-D chaotic maps. Journal of Information Security and Applications. 2019, 46: 23-41. doi: 10.1016/j.jisa.2019.02.006
23. Mansoor S, Sarosh P, Parah SA, et al. Adaptive Color Image Encryption Scheme Based on Multiple Distinct Chaotic Maps and DNA Computing. Mathematics. 2022, 10(12): 2004. doi: 10.3390/math10122004
24. Younus ZS, Hussain M K. Image steganography using exploiting modification direction for compressed encrypted data. Journal of King Saud University-Computer and Information Sciences 2022; 34(6): 2951–2963. doi: 10.1016/j.jksuci.2019.04.008
25. Yuan X, Zhang L, Chen J, et al. Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing. Applied Physics B. 2019, 125(9). doi: 10.1007/s00340-019-7286-9
26. Liansheng S, Xiao Z, Chongtian H, et al. Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Optics and Lasers in Engineering. 2019, 113: 29-37. doi: 10.1016/j.optlaseng.2018.10.002
27. Zhang L, Yuan X, Wang K, et al. Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography. IEEE Photonics Journal. 2019, 11(4): 1-14. doi: 10.1109/jphot.2019.2923705
28. Gao X, Mou J, Xiong L, et al. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dynamics. 2022, 108(1): 613-636. doi: 10.1007/s11071-021-07192-7
DOI: https://doi.org/10.24294/mipt.v7i1.3001
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Mariem Jarjar, Abid Abdellah, Hicham Rrghout, Mourad Kattass, Abdellatif Jarjar, Abdellhamid Benazzi
This work is licensed under a Creative Commons Attribution 4.0 International License.
This site is licensed under a Creative Commons Attribution 4.0 International License.