2020
DOI: 10.1109/access.2020.3019216
|View full text |Cite
|
Sign up to set email alerts
|

Robust Image Encryption With Scanning Technology, the El-Gamal Algorithm and Chaos Theory

Abstract: Digital images are the most frequently used signals to convey information in the internet era. The security of these images is the primary concern in rapidly changing networked environments. In this research, we present a novel approach to secure images by integrating a scanning technique, the El-Gamal public key cryptosystem and chaotic systems. In brief, zigzag and spiral scanning are used first to construct a permuted image. Then, the El-Gamal encryption algorithm is exploited to encrypt the permuted image.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
21
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 53 publications
(24 citation statements)
references
References 51 publications
0
21
0
Order By: Relevance
“…This algorithm has the correlation coefficient between adjacent pixels close to zero, and has random and uniform statistical characteristics in the encrypted image, and the algorithm has good ability to resist differential attacks and known/chosen plaintext attacks. Sura F. Yousif, Ali J. Abboud, and Hussein Y. Radhi [5] have introduced an image security approach to secure digital images by utilizing a scan mechanism, the El-Gamal asymmetric key cryptosystem and chaotic systems. The Lorenz chaotic system is adopted for the resulting permutated images to confuse the relation between the grey image pixels by changing their locations, whereas the Rössler chaotic system is applied to the obtained confused images to diffuse the image pixels through varying their values to achieve a second layer of encryption.…”
Section: Image Encryption Algorithmmentioning
confidence: 99%
See 4 more Smart Citations
“…This algorithm has the correlation coefficient between adjacent pixels close to zero, and has random and uniform statistical characteristics in the encrypted image, and the algorithm has good ability to resist differential attacks and known/chosen plaintext attacks. Sura F. Yousif, Ali J. Abboud, and Hussein Y. Radhi [5] have introduced an image security approach to secure digital images by utilizing a scan mechanism, the El-Gamal asymmetric key cryptosystem and chaotic systems. The Lorenz chaotic system is adopted for the resulting permutated images to confuse the relation between the grey image pixels by changing their locations, whereas the Rössler chaotic system is applied to the obtained confused images to diffuse the image pixels through varying their values to achieve a second layer of encryption.…”
Section: Image Encryption Algorithmmentioning
confidence: 99%
“…• NPCR [1,[4][5][6][7][8][9][10][11][12][13][14][15][17][18][19]: For better decryption algorithm NPCR value should be low. • UACI [1,[4][5][6][7][8][9][10][11][12][13][14][15][17][18][19]: For good decrypted image quality UACI value should be low. • PSNR [5,6,10,13,14,17,18]: The larger the PSNR value, the more similar the decrypted image is to the original image.…”
Section: E Encryption Quality Checkmentioning
confidence: 99%
See 3 more Smart Citations