CFP last date
20 May 2024
Reseach Article

Speed Image Encryption Scheme using Dynamic Galois Field GF(P) Matrices

by Hala Bahjat, May A. Salih
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 7
Year of Publication: 2014
Authors: Hala Bahjat, May A. Salih
10.5120/15513-4218

Hala Bahjat, May A. Salih . Speed Image Encryption Scheme using Dynamic Galois Field GF(P) Matrices. International Journal of Computer Applications. 89, 7 ( March 2014), 7-12. DOI=10.5120/15513-4218

@article{ 10.5120/15513-4218,
author = { Hala Bahjat, May A. Salih },
title = { Speed Image Encryption Scheme using Dynamic Galois Field GF(P) Matrices },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 7 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 7-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number7/15513-4218/ },
doi = { 10.5120/15513-4218 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:08:36.264417+05:30
%A Hala Bahjat
%A May A. Salih
%T Speed Image Encryption Scheme using Dynamic Galois Field GF(P) Matrices
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 7
%P 7-12
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption security and encryption speed are two important aspects of image encryption algorithms. Due to their increasingly large size, video images present a great challenge to currently available cryptographic algorithms; the processes of encryption and decryption of images are so computationally intensive that they introduce delays beyond acceptable real-time application limits. [1] In this paper we introduce a new algorithm that uses dynamic square matrices as both encryption keys and the control stream to verify which key will be used for each block. The study case showed in this paper works on GF(7) and for encryption key sizes varying from 3X3 to 12X12 The goal is to provide a highly secure encryption algorithm with a wide space for encryption speed.

References
  1. "Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video "Las Vegas, Nevada, USA September 20-September 23 ISBN: 0-8186-7180-7
  2. "A Symmetric Image Encryption Scheme Based on Composite Chaotic Dispersed Dynamics System" Zhenzhen Lv1, Lei Zhang2, and Jiansheng Guo 3,Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT '09) Huangshan, P. R. China, 26-28,Dec. 2009, pp. 191-194
  3. Zhang S. and M. A. Karim, pp. 318-322, Vol. 21, No. 5, June 5 1999, Color image encryption using double random phase encoding, Microwave and optical technology letters.
  4. Maniccam S. S and Bourbakis N. G. , pp. 1229-1245, 2001, Lossless image compression and encryption using SCAN, Pattern Recognition.
  5. Vinod Patidar G. Purohit, K. K. Sud, N. K. Pareek, "Image encryption through a novel permutation substitution scheme based on chaotic standard map," Chaos-Fractal Theory and its Applications, IEEE International Workshop on, 2010, pp. 164-169.
  6. Quist-Aphetsi Kester, "A cryptographic Image Encryption technique based on the RGB Pixel shuffling," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 2, issue 2, January 2013, pp. 848-854
  7. The Hacking Tutorial Website. [Online]. Available: http://www. hacking-tutorial. com/tips-and-trick/hidesecret-file-inside-an-image-steganography/
  8. "Sparse Matrix Technology" 2007 by Sergio Pissanetzky and SciControls. com. ISBN 978-0-9762775-3-8 .
  9. "Gauss Jordan elimination method for computing outer inverses " ,Predrag S. Stanimirovi_c1, Marko D. Petkovi_c2.
  10. A. A. Adb El-Latif, L. Li, T. Zhang, N. Wang, X. Song, and X. Niu, "Digital image encryption scheme based on multiple chaotic systems," Sensing. Imaging. An Int. J. vol. 13, pp. 67-88, 2012.
  11. G. Zhang, and Q. Liu, "A novel image encryption method based on total shuffling scheme," Opt. Commun. vol. 284, pp. 2775-2780, 2011.
  12. Y. Zhang, J. Xia, P. Cai, and B. Chen, "Plaintext related two-level secret key image encryption scheme," TELKOMNIKA. vol. 10, pp. 1254-1262, 2012.
  13. Yong Zhang "Encryption Speed Improvement on "An Improvement over An Image Encryption Method Based on Total Shuffling" 2013 International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS)
Index Terms

Computer Science
Information Sciences

Keywords

Galois field real time image encryption