In this paper, a new image block cipher encryption strategy for gray scale images using a different set of secret key and sizes is proposed. Initially, the swapping and dispersion is done without keys and in second stage the image is mixed with the chirikov map involving first secret key. 'N' rounds are taken to complete this process. The blended image is divided into blocks of block size 8X8.These blocks are also swapped to achieve good confusion. For making the encryption scheme more sturdy in each block the transmutation of pixels is done with the modified logistic map having three more secret keys. The proposed scheme is simple, rapid and sensitive to the secret key. Due to the high order of substitution, common attacks such as linear...
Abstract — This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shi...
This paper titled “A New Algorithm for Image Encryption Based on Slicing, Displacement Followed by S...
In this paper, a new image encryption scheme using a secret key of 128-bit size is proposed. In the ...
In this paper, a new image block cipher encryption strategy for gray scale images using a different ...
A novel non-chaos based digital image encryption technique using a combination of diffusion and subs...
Nowadays, images became one of the most types of transmitted data through Internet. Some of these im...
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the subs...
One of the most difficult issues in the history of communication technology is the transmission of s...
In the digital era, most types of transmitted data over the Internet are images. These ima...
AbstractIn this paper, an encryption algorithm for images using a secret key of 128-bits is proposed...
The process of encoding any given piece of information or data using a particular selection of avail...
We present a technique of image encryption based on Hill cipher system that provides better security...
In secure communication, image encryption schemes transform clear images into unintelligible others....
This paper deals with topic of image encryption based on chaotic maps. A solution which has advantag...
The main purpose of this work is the management of security. This will allow users authorization and...
Abstract — This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shi...
This paper titled “A New Algorithm for Image Encryption Based on Slicing, Displacement Followed by S...
In this paper, a new image encryption scheme using a secret key of 128-bit size is proposed. In the ...
In this paper, a new image block cipher encryption strategy for gray scale images using a different ...
A novel non-chaos based digital image encryption technique using a combination of diffusion and subs...
Nowadays, images became one of the most types of transmitted data through Internet. Some of these im...
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the subs...
One of the most difficult issues in the history of communication technology is the transmission of s...
In the digital era, most types of transmitted data over the Internet are images. These ima...
AbstractIn this paper, an encryption algorithm for images using a secret key of 128-bits is proposed...
The process of encoding any given piece of information or data using a particular selection of avail...
We present a technique of image encryption based on Hill cipher system that provides better security...
In secure communication, image encryption schemes transform clear images into unintelligible others....
This paper deals with topic of image encryption based on chaotic maps. A solution which has advantag...
The main purpose of this work is the management of security. This will allow users authorization and...
Abstract — This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shi...
This paper titled “A New Algorithm for Image Encryption Based on Slicing, Displacement Followed by S...
In this paper, a new image encryption scheme using a secret key of 128-bit size is proposed. In the ...