Future of Information and Communication Conference (FICC) 2024
4-5 April 2024
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 15 Issue 3, 2024.
Abstract: This research study presents a simple cryptographic solution for protecting grayscale and colored digital images, which are commonly used in computer applications. Due to their widespread use, protecting these photos is crucial to preventing unauthorized access. This article’s methodology manipulates an image’s binary matrix using basic operations. These specified actions include increasing the 8-column matrix to 64 columns, reorganizing it into 64 columns, separating it into four blocks, and shuffle the columns using secret index keys. These keys are produced using four sets of common chaotic logistic parameters. Each set executes a chaotic logistic map model to generate a chaotic key, which is then translated into an index key. This index key shuffles columns during encryption and reverses during decryption. The cryptographic approach promises a large key space that can withstand hacking. The encrypted image is secure since the decryption procedure is sensitive to the precise private key values. Private keys are frequently chaotic logistic parameters, making encryption resilient. This method is convenient since it supports images of any size and kind without modifying the encryption or decryption techniques. Shuffling replaces difficult logical procedures in typical data encryption methods, simplifying the cryptographic process. Experiments with several photos will evaluate the proposed strategy. The encrypted and decrypted photos will be examined to ensure the method meets cryptographic standards. Speed tests will also compare the proposed method to existing cryptographic methods to show its potential to speed up picture cryptography by lowering encryption and decryption times.
Mohamad Al-Laham, Firas Omar and Ziad A. Alqadi, “Image Binary Matrix Processing to Encrypt-Decrypt Digital Images” International Journal of Advanced Computer Science and Applications(IJACSA), 15(3), 2024. http://dx.doi.org/10.14569/IJACSA.2024.01503121
@article{Al-Laham2024,
title = {Image Binary Matrix Processing to Encrypt-Decrypt Digital Images},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2024.01503121},
url = {http://dx.doi.org/10.14569/IJACSA.2024.01503121},
year = {2024},
publisher = {The Science and Information Organization},
volume = {15},
number = {3},
author = {Mohamad Al-Laham and Firas Omar and Ziad A. Alqadi}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.