ارسل ملاحظاتك

ارسل ملاحظاتك لنا







A New Image Encryption Technique Combining Elliptic Curve Cryptosystem With Hill Cipher

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Dawahdeh, Ziad E. (Author)
مؤلفين آخرين: Yaakob, Shahrul N. (Co-Author) , Bin Othman, Rozmie Razif (Co-Author)
المجلد/العدد: مج30, ع3
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2018
الصفحات: 349 - 355
DOI: 10.33948/0584-030-003-004
ISSN: 1319-1578
رقم MD: 974429
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
Elliptic Curve Cryptography | Hill Cipher | Self Invertible | Entropy | Peak Signal To Noise Ratio | Unified Average Changing Intensity
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
LEADER 02483nam a22002537a 4500
001 1717218
024 |3 10.33948/0584-030-003-004 
041 |a eng 
044 |b السعودية 
100 |9 525627  |a Dawahdeh, Ziad E.  |e Author 
245 |a A New Image Encryption Technique Combining Elliptic Curve Cryptosystem With Hill Cipher 
260 |b جامعة الملك سعود  |c 2018 
300 |a 349 - 355 
336 |a بحوث ومقالات  |b Article 
520 |b Image encryption is rapidly increased recently by the increasing use of the internet and communication media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption techniques are the suitable methods to protect images from attacks. Hill cipher algorithm is one of the symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channels. A new image encryption technique that combines Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been proposed in this paper to convert Hill cipher from symmetric technique to asymmetric one and increase its security and efficiency and resist the hackers. Self-invertible key matrix is used to generate encryption and decryption secret key. So, no need to find the inverse key matrix in the decryption process. A secret key matrix with dimensions 4×4 will be used as an example in this study. Entropy, Peak Signal to Noise Ratio (PSNR), and Unified Average Changing Intensity (UACI) will be used to assess the grayscale image encryption efficiency and compare the encrypted image with the original image to evaluate the performance of the proposed encryption technique. 
653 |a أمن المعلومات  |a التشفير  |a الإنتروبيا  |a تشفير الصور 
692 |b Elliptic Curve Cryptography  |b Hill Cipher  |b Self Invertible  |b Entropy  |b Peak Signal To Noise Ratio  |b Unified Average Changing Intensity 
700 |9 525628  |a Yaakob, Shahrul N.  |e Co-Author 
700 |9 525629  |a Bin Othman, Rozmie Razif  |e Co-Author 
773 |c 004  |e Journal of King Saud University (Computer and Information Sciences)  |f Maǧalaẗ ǧamʼaẗ al-malīk Saud : ùlm al-ḥasib wa al-maʼlumat  |l 003  |m مج30, ع3  |o 0584  |s مجلة جامعة الملك سعود - علوم الحاسب والمعلومات  |v 030  |x 1319-1578 
856 |u 0584-030-003-004.pdf 
930 |d y  |p y 
995 |a science 
999 |c 974429  |d 974429 

عناصر مشابهة