2021
DOI: 10.22266/ijies2021.0430.14
|View full text |Cite
|
Sign up to set email alerts
|

Improved Color Image Encryption using Hybrid Modulus Substitution Cipher and Chaotic Method

Abstract: This study proposes the hybrid substitution cryptography method followed by chaotic methods to improve the security of digital image transactions on the internet. The substitution method used is a hybrid of the modification of the Vigenère and Beaufort cipher algorithm. To do a hybrid, two random keys are used. The first random key is a matrix with 8-bits integer values, while the second random key is a matrix that contains binary values. The modulus operation is used in the main process of substitution method… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…In the formula (2), n represents a qubit parameter, i c is Qubit represent gray value, i represents the pixel position information, and at this time, a random sequence can be generated according to the above quantum protocol. The normalization formula of this sequence () zi is shown in the following (3).…”
Section: Generate An Encrypted Return Schemementioning
confidence: 99%
See 1 more Smart Citation
“…In the formula (2), n represents a qubit parameter, i c is Qubit represent gray value, i represents the pixel position information, and at this time, a random sequence can be generated according to the above quantum protocol. The normalization formula of this sequence () zi is shown in the following (3).…”
Section: Generate An Encrypted Return Schemementioning
confidence: 99%
“…In the process of power supply and distribution, DC-AC conversion is involved, which affects the operation reliability of the power system. The power conversion [1][2][3] can be effectively carried out through the converter valve and transformer of the perfusion station, which reduces the operation risk of the power system. Therefore, there are more converter stations built in China.…”
Section: Introductionmentioning
confidence: 99%
“…Several studies have inspired this research in modifying the encryption model, one of which is research [7]. In this research, the encryption method is carried out by combining the chaotic method and the hybrid modulus substitution cipher, both of which are encryption with a chaotic system.…”
Section: Related Researchmentioning
confidence: 99%
“…Several methods for text encryption, such as Advanced Encryption Standard (AES), Data Encryption Standard (DES), 3-DES, and Rivest-Shamir-Adleman (RSA), have been proven to work well on text, but if applied to encryption of images or multimedia data, they are not suitable. Many researchers, such as in research [4][5][6][7][8], state that these methods make the encryption process less efficient, over-complex, and over-computing. Encryption on images is widely applied using the chaos method, which this method has many advantages in encrypting a digital image, some of which are ergodicity characters, sensitivity to more unpredictable initial values, low complexity, and strong correlation, and non-uniform distribution.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation