Cargando…
A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field
In the modern world, the security of the digital image is vital due to the frequent communication of digital products over the open network. Accelerated advancement of digital data exchange, the importance of information security in the transmission of data, and its storage has emerged. Multiple use...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8847011/ https://www.ncbi.nlm.nih.gov/pubmed/35178075 http://dx.doi.org/10.1155/2022/1912603 |
_version_ | 1784651959142187008 |
---|---|
author | Asif, Muhammad Asamoah, Joshua Kiddy K. Hazzazi, Mohammad Mazyad Alharbi, Adel R. Ashraf, Muhammad Usman Alghamdi, Ahmed M. |
author_facet | Asif, Muhammad Asamoah, Joshua Kiddy K. Hazzazi, Mohammad Mazyad Alharbi, Adel R. Ashraf, Muhammad Usman Alghamdi, Ahmed M. |
author_sort | Asif, Muhammad |
collection | PubMed |
description | In the modern world, the security of the digital image is vital due to the frequent communication of digital products over the open network. Accelerated advancement of digital data exchange, the importance of information security in the transmission of data, and its storage has emerged. Multiple uses of the images in the security agencies and the industries and the security of the confidential image data from unauthorized access are emergent and vital. In this paper, Bose Chaudhary Hocquenghem (BCH) codes over the Galois field are used for image encryption. The BCH codes over the Galois field construct MDS (maximum distance separable) matrices and secret keys for image encryption techniques. The encrypted image is calculated, by contrast, correlation, energy, homogeneity, and entropy. Histogram analysis of the encrypted image is also assured in this paper. The proposed image encryption scheme's security analysis results are improved compared to the original AES algorithm. Further, security agencies can utilize this work for their confidential image data. |
format | Online Article Text |
id | pubmed-8847011 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-88470112022-02-16 A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field Asif, Muhammad Asamoah, Joshua Kiddy K. Hazzazi, Mohammad Mazyad Alharbi, Adel R. Ashraf, Muhammad Usman Alghamdi, Ahmed M. Comput Intell Neurosci Research Article In the modern world, the security of the digital image is vital due to the frequent communication of digital products over the open network. Accelerated advancement of digital data exchange, the importance of information security in the transmission of data, and its storage has emerged. Multiple uses of the images in the security agencies and the industries and the security of the confidential image data from unauthorized access are emergent and vital. In this paper, Bose Chaudhary Hocquenghem (BCH) codes over the Galois field are used for image encryption. The BCH codes over the Galois field construct MDS (maximum distance separable) matrices and secret keys for image encryption techniques. The encrypted image is calculated, by contrast, correlation, energy, homogeneity, and entropy. Histogram analysis of the encrypted image is also assured in this paper. The proposed image encryption scheme's security analysis results are improved compared to the original AES algorithm. Further, security agencies can utilize this work for their confidential image data. Hindawi 2022-02-08 /pmc/articles/PMC8847011/ /pubmed/35178075 http://dx.doi.org/10.1155/2022/1912603 Text en Copyright © 2022 Muhammad Asif et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Asif, Muhammad Asamoah, Joshua Kiddy K. Hazzazi, Mohammad Mazyad Alharbi, Adel R. Ashraf, Muhammad Usman Alghamdi, Ahmed M. A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field |
title | A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field |
title_full | A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field |
title_fullStr | A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field |
title_full_unstemmed | A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field |
title_short | A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field |
title_sort | novel image encryption technique based on cyclic codes over galois field |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8847011/ https://www.ncbi.nlm.nih.gov/pubmed/35178075 http://dx.doi.org/10.1155/2022/1912603 |
work_keys_str_mv | AT asifmuhammad anovelimageencryptiontechniquebasedoncycliccodesovergaloisfield AT asamoahjoshuakiddyk anovelimageencryptiontechniquebasedoncycliccodesovergaloisfield AT hazzazimohammadmazyad anovelimageencryptiontechniquebasedoncycliccodesovergaloisfield AT alharbiadelr anovelimageencryptiontechniquebasedoncycliccodesovergaloisfield AT ashrafmuhammadusman anovelimageencryptiontechniquebasedoncycliccodesovergaloisfield AT alghamdiahmedm anovelimageencryptiontechniquebasedoncycliccodesovergaloisfield AT asifmuhammad novelimageencryptiontechniquebasedoncycliccodesovergaloisfield AT asamoahjoshuakiddyk novelimageencryptiontechniquebasedoncycliccodesovergaloisfield AT hazzazimohammadmazyad novelimageencryptiontechniquebasedoncycliccodesovergaloisfield AT alharbiadelr novelimageencryptiontechniquebasedoncycliccodesovergaloisfield AT ashrafmuhammadusman novelimageencryptiontechniquebasedoncycliccodesovergaloisfield AT alghamdiahmedm novelimageencryptiontechniquebasedoncycliccodesovergaloisfield |