ارسل ملاحظاتك

ارسل ملاحظاتك لنا







يجب تسجيل الدخول أولا

A New Image Encryption Technique Combining Elliptic Curve Cryptosystem With Hill Cipher

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Dawahdeh, Ziad E. (Author)
مؤلفين آخرين: Yaakob, Shahrul N. (Co-Author) , Bin Othman, Rozmie Razif (Co-Author)
المجلد/العدد: مج30, ع3
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2018
الصفحات: 349 - 355
DOI: 10.33948/0584-030-003-004
ISSN: 1319-1578
رقم MD: 974429
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
Elliptic Curve Cryptography | Hill Cipher | Self Invertible | Entropy | Peak Signal To Noise Ratio | Unified Average Changing Intensity
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
المستخلص: Image encryption is rapidly increased recently by the increasing use of the internet and communication media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption techniques are the suitable methods to protect images from attacks. Hill cipher algorithm is one of the symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channels. A new image encryption technique that combines Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been proposed in this paper to convert Hill cipher from symmetric technique to asymmetric one and increase its security and efficiency and resist the hackers. Self-invertible key matrix is used to generate encryption and decryption secret key. So, no need to find the inverse key matrix in the decryption process. A secret key matrix with dimensions 4×4 will be used as an example in this study. Entropy, Peak Signal to Noise Ratio (PSNR), and Unified Average Changing Intensity (UACI) will be used to assess the grayscale image encryption efficiency and compare the encrypted image with the original image to evaluate the performance of the proposed encryption technique.

ISSN: 1319-1578

عناصر مشابهة