2018 IEEE Second International Conference on Data Stream Mining &Amp; Processing (DSMP) 2018
DOI: 10.1109/dsmp.2018.8478471
|View full text |Cite
|
Sign up to set email alerts
|

Elements of RSA Algorithm and Extra Noising in a Binary Linear-Quadratic Transformations During Encryption and Decryption of Images

Abstract: An algorithm is proposed for encryptingdecrypting images using RSA algorithm elements, as the most cryptographically resistant to unauthorized decryption related to images with strictly clear edges. It is proposed to use RSA algorithm elements as coefficients of some linear-quadratic affine transformation. The proposed algorithm has a higher cryptographic stability compared to RSA algorithm.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Elements of the RSA algorithm are called prime numbers P and Q, as well as numbers e and d from the congruence ed ≡ 1 (mod φ(N)), N = P *Q, φ(N), is an Euler's function. Let us assume that the image is matched by a color matrix (matrix of pixel intensities) [13][14][15] 1…”
Section: Encryption Techniquementioning
confidence: 99%
“…Elements of the RSA algorithm are called prime numbers P and Q, as well as numbers e and d from the congruence ed ≡ 1 (mod φ(N)), N = P *Q, φ(N), is an Euler's function. Let us assume that the image is matched by a color matrix (matrix of pixel intensities) [13][14][15] 1…”
Section: Encryption Techniquementioning
confidence: 99%
“…These results were set to not give rise to the presence of contours in the encrypted image [ 32 ]. Additionally, other approaches, such as linear and quadratic fractal algorithms [ 33 , 34 ], projective transformations [ 35 ], and binary linear-quadratic transformations [ 36 ], are also used for image encryption and decryption. A model of image encryption based on a complex chaos-based pseudorandom number generator and modified advanced encryption standard was proposed by Hafsa et al On the Altera Cyclone III board, the overall system was created.…”
Section: Introductionmentioning
confidence: 99%