2020
DOI: 10.1109/access.2020.3016401
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Modular Approach Based Substitution-Box Design for Image Encryption

Abstract: In modern-day block ciphers, the role of substitution-boxes is to transform the plaintext data nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed that the robustness and security of such block ciphers heavily based on the cryptographic strength of the underlying substitution-boxes. Reason being, they are the only components that are held responsible to bring required nonlinearity and complexity into the security system which can frustrate the attackers. Accordingly, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
56
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 80 publications
(57 citation statements)
references
References 74 publications
0
56
0
1
Order By: Relevance
“…Similarly, the correlation coefficient of Baboon image using ICA algorithm is tabulated in Table 3. The proposed correlation coefficient of Baboon is 0.0021 which gives better result than the algorithm developed in the studies [27][28][29][30][31]. From Table 2 and Table 3, it is observed that the proposed encryption scheme has desired correlation property.…”
Section: Imagementioning
confidence: 88%
“…Similarly, the correlation coefficient of Baboon image using ICA algorithm is tabulated in Table 3. The proposed correlation coefficient of Baboon is 0.0021 which gives better result than the algorithm developed in the studies [27][28][29][30][31]. From Table 2 and Table 3, it is observed that the proposed encryption scheme has desired correlation property.…”
Section: Imagementioning
confidence: 88%
“…int ModularMultiplicativeInverse (int V): This procedure calculates the multiplicative inverse of a value V using MOD257. Mechanism of this calculation is described in [19].…”
Section: Proposed Construction Of Dynamic S-boxmentioning
confidence: 99%
“…This method is very simple, effective, and efficient to create robust S-boxes. An innovative approach was proposed in [19] to construct robust S-boxes using linear transformation. This approach augments the strength of the resultant S-box using the permutation process.…”
Section: Introductionmentioning
confidence: 99%
“…Sensitive data is required to be transmitted in an inexplicable form by the intruders [1]. Cryptographic system gives a significant role in providing data security and maintain privacy.…”
Section: Introductionmentioning
confidence: 99%