Enhancing Image Encryption with the Kronecker xor Product, the Hill Cipher, and the Sigmoid Logistic Map
نویسندگان
چکیده
In today’s digital age, it is crucial to secure the flow of information protect data and from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines Kronecker xor product, Hill cipher, sigmoid logistic Map. Our proposed algorithm begins by shifting values in each row state matrix left predetermined number positions, then encrypting resulting using Cipher. The top value odd even column used perform an operation with all corresponding column, excluding value. diffused map subjected product among pixels create image. again other keys for final product. We compared our method recent work found be safe efficient terms performance after conducting statistical analysis, differential attack brute force entropy analysis. results demonstrate robust, lightweight, fast performance, meets requirements decryption, resistant various attacks.
منابع مشابه
Image Encryption Using Advanced Hill Cipher Algorithm
The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the key matrix used for the encryption is itself invertible. So, ...
متن کاملthe evaluation of language related engagment and task related engagment with the purpose of investigating the effect of metatalk and task typology
abstract while task-based instruction is considered as the most effective way to learn a language in the related literature, it is oversimplified on various grounds. different variables may affect how students are engaged with not only the language but also with the task itself. the present study was conducted to investigate language and task related engagement on the basis of the task typolog...
15 صفحه اولImage encryption using the two-dimensional logistic chaotic map
Chaos maps and chaotic systems have been proved to be useful and effective for cryptography. In this paper, the two-dimensional logistic map with complicated basin structures and attractors are first used for image encryption. The proposed method adopts the classic framework of the permutation-substitution network in cryptography and thus ensures both confusion and diffusion properties for a se...
متن کاملAdvanced Partial Image Encryption using Two-Stage Hill Cipher Technique
Information security is a fast growing research field which includes numerous problems in it. Partial image encryption is one of the important problems in the field of image information security. This paper describes the partial image encryption in two ways using hill cipher technique. First encryption technique uses two slightly different keys to construct two self-invertible matrices, which a...
متن کاملAdvanced Partial Image Encryption using Two-Stage Hill Cipher Technique
Information security is a fast growing research field which includes numerous problems in it. Partial image encryption is one of the important problems in the field of image information security. This paper describes the partial image encryption in two ways using hill cipher technique. First encryption technique uses two slightly different keys to construct two self-invertible matrices, which a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13064034