A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography

被引:11
作者
Abu-Faraj, Mua'ad [1 ]
Al-Hyari, Abeer [2 ]
Alqadi, Ziad [3 ]
机构
[1] Univ Jordan, Dept Comp Informat Syst, Aqaba 77110, Jordan
[2] Al Balqa Appl Univ, Elect Engn Dept, As Salt 19117, Jordan
[3] Al Balqa Appl Univ, Comp & Networks Engn Dept, Amman 15008, Jordan
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 04期
关键词
MPK; image_key; speedup; throughput; MSE; PSNR;
D O I
10.3390/sym14040664
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process. In addition, they use private keys of a specific length, in addition to the fixed length of the data block used in encryption, which may provide the possibility of penetration of these methods, thus decreasing the level of security. In this research paper, a new method of digital image cryptography is introduced. This method is based on using a color image as an image key to generate a sophisticated matrix private key (MPK) that cannot be hacked. The proposed method uses an initial state to set the required parameters, with secret information needed to generate the private key. The data-block size is variable, and the complicity of the MPK depends on the number of selected rounds and the data-block size. The proposed method is appropriate for publication in Symmetry because it employs a symmetrical complex matrix key to encrypt and decrypt digital images. The proposed method is simple yet very efficient in terms of throughput and scalability. The experiments show that the proposed method meets the quality requirements and can speed up the encryption-decryption process compared with standard methods, including DES, 3DES, AES, and Blowfish.
引用
收藏
页数:14
相关论文
共 24 条
[1]  
Abd Elminaam D.S., 2010, Int. J. Netw. Secur., V10, P216
[2]  
Al-qdah M., 2007, Int. J. Comput. Sci. Secur, V1, P33
[3]  
Alqadi Z., 2019, International Journal of Electrical and Computer Engineering, V9, P4092
[4]  
[Anonymous], 2013, INT J ENG RES TECHNO
[5]  
[Anonymous], 2010, International Journal of Network Security
[6]  
Asad A, 2019, INT J MED RES HEALTH, V8, P50
[7]  
Asok SB, 2013, 2013 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), P748, DOI 10.1109/iccsp.2013.6577156
[8]  
Babu SG, 2013, IEEE SYM COMPUT INTE, P52, DOI 10.1109/CICYBS.2013.6597206
[9]  
Gadanayak B., 2011, INT J COMPUT APPL, V26, P28
[10]  
Gandhi R.A., 2014, INT J INNOV RES ADV, V1, P184