Image Encryption Techniques Using Dynamic Approach : An Article Review

Main Article Content

Dr. Wisam Abed Shukur
Zaid M. Jawad Kubba
Ahmed Badrulddin
Diaa Mohammed Uliyan

Abstract

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to


In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabrication of the S-box has a very large key space as it depends on the user's key. The encryption-decryption method allows changing pixel positions with the help of dynamically generated S-boxes, images, videos, etc. Thus, the study shows that a new method of S-boxes for dynamic cipher algorithms can be easily generated and applied to image encryption.

Article Details

How to Cite
Image Encryption Techniques Using Dynamic Approach : An Article Review. (2023). Ibn AL-Haitham Journal For Pure and Applied Sciences, 36(4), 457-467. https://doi.org/10.30526/36.4.3303
Section
Computer

How to Cite

Image Encryption Techniques Using Dynamic Approach : An Article Review. (2023). Ibn AL-Haitham Journal For Pure and Applied Sciences, 36(4), 457-467. https://doi.org/10.30526/36.4.3303

Publication Dates

References

Ge, X., et al., Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Transactions on Dependable and Secure computing, 2019. 18(1): p. 490-504.

Fernando, E., et al. Performance comparison of symmetries encryption algorithm AES and DES with raspberry pi. in 2019 International Conference on Sustainable Information Engineering and Technology (SIET). 2019. IEEE.

Shukur, W.A., A proposed method for generating a private key using digital color image. International Journal of Applied Engineering Research, 2017. 12(16): p. 6235-6240.

Sankpal, P.R., Vijaya, P.A., "Image Encryption Using Chaotic Maps: A Survey", Fifth International Conference on Signal and Image Processing, 8-10 January 2014, Jeju Island, pp.102-107, DOI: 10.1109/ ICSIP.2014.80.

Kubba, Z.M.J. and H.K. Hoomod. A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System. in 2019 First International Conference of Computer and Applied Sciences (CAS). 2019. IEEE.

Kubba, Z.M.J. and H.K. Hoomod. Developing a lightweight cryptographic algorithm based on DNA computing. in AIP Conference Proceedings. 2020. AIP Publishing LLC.

Abraham, L., Daniel, N., “Secure Image Encryption Algorithms: A Review”, International Journal of Scientific & Technology Research, (2013) 2(4) 186-189.

Sheng, T., Q. Hong, and X. Junjie, K-DSA for the multiple traveling salesman problem. Journal of Systems Engineering and Electronics, 2023.

Moses, L.E., Oakford R.V., "Tables of Random Permutations", Stanford University Press, ISBN-13: 978-0804701488, 1963.

Durstenfeld, R., "Algorithm 235: Random permutation", Communications of the ACM, (1964) 7(7) 420.

Knuth, D.E., "The Art of Computer Programming", 2th Edition, Addison-Wesley, 1969, 139- 140.

Güvenoğlu, E., Esin, E.M., "Knutt/Durstenfeld Shuffle Algoritmasının Resim Şifreleme Amacıyla Kullanılması", Politeknik Dergisi, (2009) 12(3) 151-155.

Shukur, W.A., L.K. Qurban, and A. Aljuboori, Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms. Baghdad Science Journal, 2023.

Özcan, H., et al., A new visual cryptography method based on the profile hidden Markov model. Advances in Electrical and Computer Engineering, 2021. 21(1): p. 21-36.

Hussain, I., Shah, T., Gondal, M.A., Mahmood, H., " Efficient method for designing chaotic S-boxes based on generalized Baker's map and TDERC chaotic sequence", Nonlinear Dynamics, ( 2013) 74(1) 271-275.

Osorio, F., et al., Statistical estimation of the structural similarity index for image quality assessment. Signal, Image and Video Processing, 2022: p. 1-8.

Naveenkumar, S.K., Panduranga, H.T., "Triple image encryption based on integer transform and chaotic map", International Conference on Optical Imaging Sensor and Security (ICOSS), 2-3 July 2013, Tamil Nadu, India, pp. 1-6.

Simion, E., Entropy and randomness: From analogic to quantum world. IEEE Access, 2020. 8: p. 74553-74561.