In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by u...
Abstract — This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shi...
Cryptography is the science of converting confidential information into unintelligible format. To pr...
Currently, images are very important with the rapid growth of communication networks. Therefore, ima...
In this paper, a new image encryption scheme for colour BMP images using a secret key of 120-bits is...
In the digital era, most types of transmitted data over the Internet are images. These ima...
In this paper, a new image encryption scheme using a secret key of 128-bit size is proposed. In the ...
International audienceThe protection of multimedia content has become a key area of research, since ...
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is prop...
A novel non-chaos based digital image encryption technique using a combination of diffusion and subs...
In this study, we propose an innovative image encryption Techniques based on four different image en...
As a result of the rise in network technology, information security has become particularly importan...
Image scrambling is the conversion of images to unreadable format for security reasons. Encrypting a...
Nowadays, images became one of the most types of transmitted data through Internet. Some of these im...
A new image encryption scheme is proposed with a combination of block scrambling, closed-loop diffus...
In this paper, a new image block cipher encryption strategy for gray scale images using a different ...
Abstract — This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shi...
Cryptography is the science of converting confidential information into unintelligible format. To pr...
Currently, images are very important with the rapid growth of communication networks. Therefore, ima...
In this paper, a new image encryption scheme for colour BMP images using a secret key of 120-bits is...
In the digital era, most types of transmitted data over the Internet are images. These ima...
In this paper, a new image encryption scheme using a secret key of 128-bit size is proposed. In the ...
International audienceThe protection of multimedia content has become a key area of research, since ...
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is prop...
A novel non-chaos based digital image encryption technique using a combination of diffusion and subs...
In this study, we propose an innovative image encryption Techniques based on four different image en...
As a result of the rise in network technology, information security has become particularly importan...
Image scrambling is the conversion of images to unreadable format for security reasons. Encrypting a...
Nowadays, images became one of the most types of transmitted data through Internet. Some of these im...
A new image encryption scheme is proposed with a combination of block scrambling, closed-loop diffus...
In this paper, a new image block cipher encryption strategy for gray scale images using a different ...
Abstract — This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shi...
Cryptography is the science of converting confidential information into unintelligible format. To pr...
Currently, images are very important with the rapid growth of communication networks. Therefore, ima...