Nowadays, images became one of the most types of transmitted data through Internet. Some of these images carry secret information, therefore having an effective cryptosystem for hiding the information inside these images become an urgent need. Many traditional encryption methods are unable to achieve a high degree of protection for information. This paper presents nontraditional method for image encryption through applying substitution and transposition operations in different ways on both key and data. Series of (Linear and Circular), (Left, Right, Up and Down) rotation operations on (Bits and Bytes) of key and data are applied to make good confusion effects in the data. Moreover, XOR Boolean operations also applied on the key and data to ...
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is prop...
Image security is still one of the important fields in multimedia processing because it’s used in ou...
The main purpose of this work is the management of security. This will allow users authorization and...
Nowadays, images became one of the most types of transmitted data through Internet. Some of these im...
Abstract — This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shi...
In the digital era, most types of transmitted data over the Internet are images. These ima...
This paper presents a simple but secure novel reversible scheme for hiding a whole encrypted image i...
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the subs...
We propose a novel image encryption algorithm based on two pseudorandom bit generators: Chebyshev ma...
Image scrambling is the conversion of images to unreadable format for security reasons. Encrypting a...
One popular image security technique is image encryption. This research proposes an image encryption...
Nowadays while transferring and receiving the data like images, messages and other information, cert...
Along with the rapid increasing growth of computer and network technologies, images are being transm...
A novel non-chaos based digital image encryption technique using a combination of diffusion and subs...
Internet plays an important role in circulating a huge amount of multimedia. An example of this mult...
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is prop...
Image security is still one of the important fields in multimedia processing because it’s used in ou...
The main purpose of this work is the management of security. This will allow users authorization and...
Nowadays, images became one of the most types of transmitted data through Internet. Some of these im...
Abstract — This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shi...
In the digital era, most types of transmitted data over the Internet are images. These ima...
This paper presents a simple but secure novel reversible scheme for hiding a whole encrypted image i...
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the subs...
We propose a novel image encryption algorithm based on two pseudorandom bit generators: Chebyshev ma...
Image scrambling is the conversion of images to unreadable format for security reasons. Encrypting a...
One popular image security technique is image encryption. This research proposes an image encryption...
Nowadays while transferring and receiving the data like images, messages and other information, cert...
Along with the rapid increasing growth of computer and network technologies, images are being transm...
A novel non-chaos based digital image encryption technique using a combination of diffusion and subs...
Internet plays an important role in circulating a huge amount of multimedia. An example of this mult...
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is prop...
Image security is still one of the important fields in multimedia processing because it’s used in ou...
The main purpose of this work is the management of security. This will allow users authorization and...