Cite

1. Stallings, W. Cryptography and Network Security. 5th Edition. Pearson Publishers, Prentice Hall, 2011.Search in Google Scholar

2. Salama, D., A, Minaam, H., M. Abdual-Kader, M. Mohamed Hadhou d. Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. - International Journal of Network Security, Vol. 2, 2010, No 2, pp. 78-87.Search in Google Scholar

3. Gong-Bin, Q., J. Qing-Feng, Q. Shui-Sheng. A New Image Encryption Scheme Based on DES Algorithm and Chua’s Circuit. - In: Proc. of IEEE International Workshop on Imaging Systems and Techniques, 2009, pp. 168-172.Search in Google Scholar

4. Ling, B., L. Lichen, Z. Jan. Image Encryption Algorithm Based on Chaotic Map and S-DES. - Advanced Computer Control (ICACC), IEEE, Vol. 5, 2010, pp 41-44.10.1109/ICACC.2010.5486998Search in Google Scholar

5. Kaufman, C., R. Perlman, M. Speciner. Network Security: Private Communication in aPublic World. Upper Saddle River, NJ, US, Prentice Hall Press, 2002. Search in Google Scholar

6. Nie, T., T. Zhang. A Study of DESand Blowfish Encryption Algorithm. - In: Proc. of TENCONIEEE Region 10 Conference, 2009, pp. 1-4.10.1109/TENCON.2009.5396115Search in Google Scholar

7. Xiao, H., Q. Shuisheng, D. Chengliang. A Composite Image Encryption Scheme Using AESand Chaotic Series. - In: Proc. of 1st ISDPE, IEEE, 2007, pp. 277-279.Search in Google Scholar

8. Msolli, A., A. Helali, H. Maaref. Image Encryption with the AES Algorithm in Wireless Sensor Network. - In: Proc. of 2nd International Conference on Advanced Technologies for Signal and Image Processing, IEEE, 2016, pp. 41-45.10.1109/ATSIP.2016.7523055Search in Google Scholar

9. Schneier, B. Description ofa New Variable-Length Key, 64-Bit Block Cipher (Blowfish). - In: Proc. of International Workshop on FSE, Springer, Vol. 809, 1994, pp. 191-204.10.1007/3-540-58108-1_24Search in Google Scholar

10. Aurora, T., P. Arora. Blowfish Algorithm. - IJCSCE, Vol. 2, NCRAET-2013, Special Issue, pp. 238-243. Search in Google Scholar

11. Ali, M., B. Younes, A. Jantan. Image Encryption Using Block-Based Transformation Algorithm. - IAENG International Journal of Computer Science, Vol. 35, 2008, No 1, pp. 407-415.Search in Google Scholar

12. Rise, R. E., S.-H. Cho, D. Kaylor. RC4 Encryption. 2008. https://www.math.washington.edu/~nichifor/310_2008_Spring/Pres_RC4%20Encryption.pdfSearch in Google Scholar

13. Stošić, L., M. Bogdanović. RC4 Stream Cipher and Possible Attacks on WEP. - IJACSA, Vol. 3, 2012, No 3, pp. 110-114.10.14569/IJACSA.2012.030319Search in Google Scholar

14. Mousa, A., A. Hamad. Evaluation of the RC4 Algorithm for Data Encryption. - International Journal of Computer Science and Application, Vol. 3, 2006, No 2, pp. 44-56.Search in Google Scholar

15. Ginting, R. U., R. Y. Dillak. Digital Color Image Encryption Using RC4 Stream Cipher and Chaotic Logistic Map. - ICITEE, IEEE, 2013, pp. 101-105.10.1109/ICITEED.2013.6676220Search in Google Scholar

16. Sasidharan, S., D. S. Philip. A Fast Partial Image Encryption Scheme with Wavelet Transform and RC4. - International Journal of Advances in Engineering & Technology, Vol. 1, 2011, No 4, pp. 322-331.Search in Google Scholar

17. Riad, A. M., A. H. Hussein, H. M. Kasem, A. A. El-Azm. A New Efficient Image Encryption Technique Based on Arnold and IDEA Algorithms. - ICIIP, Vol. 46, 2012, pp. 140-145.Search in Google Scholar

18. Singh, H. P., S. Verma, S. Mishr. Secure-International Data Encryption Algorithm. - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, 2013, No 2, pp. 780-792.Search in Google Scholar

19. Worthington, B. An Introduction to Hill Ciphers Using Linear Algebra. University of North Texas, 2010, pp 1-24.Search in Google Scholar

20. Bibhudendra, A., S. K. Panigrahy, S. K. Patra, G. Panda. Image Encryption Using Advanced Hill Cipher Algorithm. - IJRTER, Vol. 1, 2009, No 1 pp. 663-667.Search in Google Scholar

21. Mishra, D. C., R. K. Sharma. Grayscale-Image Encryption Using Random Hill Cipher over SLn(F) Associated with Discrete Wavelet Transformation. - AAM: An International Journal, Vol. 8, 2013, No 2, pp. 777-791.Search in Google Scholar

22. Yang, C., M. Hua, S. Jia. Image Encryption Algorithm Based on Chaotic Mapping and Chinese Remainder Theorem. - Metallurgical and Mining Industry, 2015, No 4, pp. 206-212.Search in Google Scholar

23. Kong, L., L. Li. A New Image Encryption Algorithm Based on Chaos. - In: Proc. of 35th Chinese Control Conference, IEEE, 2016, pp. 4932-4937.10.1109/ChiCC.2016.7554120Search in Google Scholar

24. Chen, T., M. Zhang, J. Wu, C. Yuen, Y. Tong. Image Encryption and Compression Based on Kronecker Compressed Sensing and Elementary Cellular Automata Scrambling. - Optics & Laser Technology, Elsevier, Vol. 84, 2016, pp. 118-133.10.1016/j.optlastec.2016.05.012Search in Google Scholar

25. Hua, Z., Y. Zhou. Image Encryption Using 2D Logistic-Adjusted-Sine Map. - Information Sciences, Elsevier, Vol. 339, 2016, pp. 237-253.10.1016/j.ins.2016.01.017Search in Google Scholar

26. Tang, Z., J. Song, X. Zhang, R. Sun. Multiple-Image Encryption with Bit-Plane Decomposition and Chaotic Maps. - Optics and Lasers in Engineering, Elsevier, Vol. 80, 2016, pp. 1-11.10.1016/j.optlaseng.2015.12.004Search in Google Scholar

27. Ye, G. Image Scrambling Encryption Algorithm of Pixel Bit Based on Chaos Map. - Pattern Recognition Letters, Elsevier, Vol. 31, 2010, pp. 347-354.10.1016/j.patrec.2009.11.008Open DOISearch in Google Scholar

28. Abdul, N., M. Abbas. Image Encryption Based on Independent Component Analysis and Arnold’s Cat Map. - Egyptian Informatics Journal, Elsevier, Vol. 17, 2015, pp. 139-146.10.1016/j.eij.2015.10.001Search in Google Scholar

29. Lin, Z.-H., H.-X. Wang. Image Encryption Based on Chaos with PWL Memristor in Chua’s Circuit. - ICCCAS, IEEE, 2009, pp. 964-968.Search in Google Scholar

30. Zhang, H., R. Cai. Image Encryption Algorithm Based on Bit-Plane Scrambling and Multiple Chaotic Systems Combination. - ICISS, IEEE, 2010, pp. 113-117.Search in Google Scholar

31. Tang, Z., X. Zhang, W. Lan. Efficient Image Encryption with Block Shuffling and Chaotic Map. - Multimed Tools Appl., Springer, Vol. 74, 2014, No 15, pp. 5429-5448.10.1007/s11042-014-1861-1Search in Google Scholar

32. Zhang, Y. P., P. Xu, L. Z. Xiang. Research of Image Encryption Algorithm Based on Chaotic Magic Square. - Advances in ECWAC, Springer, Vol. 2, 2012, pp. 103-109.10.1007/978-3-642-28658-2_16Search in Google Scholar

33. Wang, D., C.-C. Chang, Y. Liu, G. Song, Y. Liu. Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values. - International Journal of Network Security, Vol. 17, 2015, No 3, pp. 322-327.Search in Google Scholar

34. Milanov, E. The RSA Algorithm. 3 June 2009. https://www.math.washington.edu/~morrow/336_09/papers/Yevgeny.pdfSearch in Google Scholar

35. Vinothini, Saranya, Vasumath i. A Study on RSA Algorithm for Cryptography. - IJCSIT, Vol. 5, 2014, pp. 5708-5709.Search in Google Scholar

36. Anandakumar, S. Image Cryptography Using RSA Algorithm in Network Security. - IJCSET, Vol. 5, 2015, No 9, pp. 326-330.Search in Google Scholar

37. Chandel, G. S., P. Patel. A Review: Image Encryption with RSAand RGB Randomized Histograms. - IJARCCE, Vol. 2, 2013, No 11, pp. 4391-4401.Search in Google Scholar

38. Oswald, E. Introduction to Elliptic Curve Cryptography. 2005. http://www.vanilla47.com/PDFs/Cryptography/Miscellenea/Introduction_to_Elliptic_Curve_Cryptography.pdfSearch in Google Scholar

39. Mohamed, A., S. Eldeen, Abdellatif, A. Elkouny, S. Elraml y. DES Algorithm Security Fortification Using Elliptic Curve Cryptography. - ICCES, IEEE, 2015, pp. 335-340.10.1109/ICCES.2015.7393071Search in Google Scholar

40. Suganya, N., S. Sathiy a. Encryption of Image Matrix Using Elliptic Curve Cryptography. - IJITE, Vol. 2, 2012, pp. 229-232.Search in Google Scholar

41. Shuangyuan, Y., L. Zhengding, H. Shuihu a. An Asymmetric Image Encryption Based on Matrix Transformation. - ISCIT, IEEE, Vol. 1, 2004, pp. 66-69.Search in Google Scholar

42. Kester, Q.-A., L. Nana, A. C. Paseu. A New Hybrid Asymmetric Key-Exchange and Visual Cryptographic Algorithm for Securing Digital Images. - In: Proc. of International Conference on AST, IEEE, 2013, pp. 1-5.10.1109/ICASTech.2013.6707497Search in Google Scholar

43. Sasi, S., D. L. Swarna Jyothi. A Heuristic Approach for Secured Transmission of Image Based on Bernstein Polynomial. - In: Proc. of International Conference on Circuits, Communication, Control and Computing, IEEE, 2013, pp. 312-315.10.1109/CIMCA.2014.7057813Search in Google Scholar

44. Chhotaray, S. K., A. Chhotaray, G. Sankar Rath. A New Method of Generating Public Key Matrix and Using It for Image Encryption. - In: Proc. of 2nd International Conference on Signal Processing and Integrated Networks (SPIN), IEEE, 2015, pp. 453-458.10.1109/SPIN.2015.7095272Search in Google Scholar

45. Elashry, I., O. Allah, A. Abbas, S. El-Rabaie, F. El-Samie. Homomorphic Image Encryption. - Journal of Electronic Imaging, Vol. 18, 2009, No 3, pp. 1-14.10.1117/1.3167847Search in Google Scholar

46. El-Fishawy, N., O. Zaid. Quality of Encryption Measurement of Bitmap Images with Rc6, Mrc6, and Rijndael Block Cipher Algorithms. - International Journal of Network Security, Vol. 5, 2007, No. 3, pp. 241-251.Search in Google Scholar

47. Kamali, S., R. Shakerian, M. Hedayati, M. Rahman i. A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption. - In: Proc. of International Conference on Electronics and Information Engineering, IEEE, Vol. 1, 2010, pp. 1-141.10.1109/ICEIE.2010.5559902Search in Google Scholar

48. Ahmad, J., F. Ahmed. Efficiency Analysis and Security Evaluation of Image Encryption Schemes. - International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS, Vol. 12, 2012, No 4, pp. 18-31.Search in Google Scholar

49. Shannon, C. Communication Theory of Secrecy Systems. - Bell System Technical Journal, Vol. 28, 1949, No 4, pp. 656-715. 10.1002/j.1538-7305.1949.tb00928.xSearch in Google Scholar

50. Lian, S. Multimedia Content Encryption: Techniques and Applications. Auerbach Publications, CRC Press, Taylor and Francis Group. 2008.10.1201/9781420065282Search in Google Scholar

51. Elkamchouchi, H., M. Makar. Measuring Encryption Quality for Bitmap Images Encrypted with Rijndael and Kamkar Block Ciphers. - In: Proc. of 22nd IEEE National, Radio Science Conference (NRSC’05), 2005, pp. 277-284.10.1109/NRSC.2005.194011Search in Google Scholar

52. Ahmed, H., H. Kalash, O. Allah. Encryption Efficiency Analysis and Security Evaluation of Rc6 Block Cipher for Digital Images. - In: Proc. of International Conference on Electrical Engineering, IEEE, 2007, pp. 1-7.10.1109/ICEE.2007.4287293Search in Google Scholar

53. El-lskan darani, M., S. Darwish, S. Abugub a. A Robust and Secure Scheme for Image Transmission over Wireless Channels. - In: Proc. of 42nd Annual International Conference on CST, IEEE, 2008, pp. 51-55.10.1109/CCST.2008.4751276Search in Google Scholar

54. Ranjan, K. H. S., H. R. P. Kumar, K. B. Sudeepa, G. Aithal. Enhanced Security System Using Visual Cryptograhy and Symmetric Encryption. - International Journal of Advances in Engineering & Technology (IJAET), Vol. 6, 2013, No 3, pp. 1211-1219.Search in Google Scholar

55. Naor, M., A. Shamir. Visual Cryptography. - Proceedings of Advances in Cryptology, EUROCRYPT 94, Springer-Verlag, LNCS, Vol. 950, 1994, pp. 1-12.10.1007/BFb0053419Search in Google Scholar

56. Prabir, K. Naskar, Ayan Chaudhuri, Debarati Basu, Atal Chaudhur i. A Novel Image Secret Sharing Scheme. - In: Proc. of 2nd International Conference on Emerging Applications of Information Technology, IEEE, 2011, pp. 177-180.Search in Google Scholar

57. Sharma, H., N. Kumar, G. K. Jha. Enhancement of Security in Visual Cryptography System Using Cover Image Share Embedded Security Algorithm (CISEA). - In: Proc. of International Conference on Computer & Communication Technology (ICCCT’11), IEEE, 2011, pp. 462-467.10.1109/ICCCT.2011.6075137Search in Google Scholar

58. Kafri, O., E. Keren. Encryption of Pictures and Shapes by Random Grids. - Optics Letters, Vol. 12, 1987, pp. 377-379.10.1364/OL.12.000377Open DOISearch in Google Scholar

59. Hawkes, L. W., A. Yasinsac, C. Cline. An Application of Visual Cryptography to Financial Documents. Technical Report, Florida State University, 2000.Search in Google Scholar

60. Li, M.-J., J. S.-T. Juan. A Flexible Multiple-Secret Image Sharing Scheme by Shifting Random Grids. - In: Proc. of 17th International Symposium on Consumer Electronics (ISCE’13), IEEE, 2013, pp. 289-290.10.1109/ISCE.2013.6570232Search in Google Scholar

61. Joy, J., Y. Chang, S. Justice, T. Juan. Multi VSS Scheme by Shifting Random Grids. - World Academy of Science, Engineering and Technology, Vol. 67, 2012, pp. 936-942.Search in Google Scholar

62. Jothi, R., A. Ojha. On Multi-Secret Sharing Using Hill Cipher and Random Grids. - In: Proc. of International Conference on Advances in Computer Engineering and Applications (ICACEA’15), IEEE, 2015, pp. 683-687.10.1109/ICACEA.2015.7164778Search in Google Scholar

63. Chen, W.-K. Image Sharing Method for Gray-Level Images. - Journal of Systems and Software, Vol. 86, 2013, pp. 581-585.10.1016/j.jss.2012.09.040Open DOISearch in Google Scholar

64. Sruthy, K., J. R. Ramesh. Random Grid Based Visual Cryptography Usinga Common Share. - In: Proc. of International Conference on Computing and Network Communications (Co Co Net’15), IEEE, 2015, pp. 656-662.Search in Google Scholar

65. Liu, F., C. Wu. Embedded Extended Visual Cryptography Schemes. - IEEE Transactions on Information Forensics and Security, Vol. 6, 2011, No 2, pp. 307-322.10.1109/TIFS.2011.2116782Open DOISearch in Google Scholar

66. Askari, N., H. M. Heys, C. R. Molone y. An Extended Visual Cryptography Scheme without Pixel Expansion for Halftone Images. - In: Proc. of 26th Annual IEEE Canadian Conference on Electrical and Computer Engineering, 2013, pp. 1-6.10.1109/CCECE.2013.6567726Search in Google Scholar

67. Kang, I., R. Gonzalo, Arce, H.-K. Lee. Color Extended Visual Cryptography Using Error Diffusion. - ICASSP, IEEE, 2009, pp. 1473-1476.Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology