DOI QR코드

DOI QR Code

Rounds Reduction and Blocks Controlling to Enhance the Performance of Standard Method of Data Cryptography

  • Abu-Faraj, Mua'ad M. (The University of Jordan) ;
  • Alqadi, Ziad A. (Albalaqa Applied University)
  • Received : 2021.12.05
  • Published : 2021.12.30

Abstract

Color digital images are used in many multimedia applications and in many vital applications. Some of these applications require excellent protection for these images because they are confidential or may contain confidential data. In this paper, a new method of data cryptography is introduced, tested, and implemented. It will be shown how this method will increase the security level and the throughput of the data cryptography process. The proposed method will use a secret image_key to generate necessary private keys for each byte of the data block. The proposed method will be compared with other standard methods of data cryptography to show how it will meet the requirements of excellent cryptography, by achieving the objectives: Confidentiality, Integrity, Non-repudiation, and Authentication.

Keywords

References

  1. Hamdan, M., Subaih, B., Alqadi, Z.: Extracting Isolated Words from an Image of Text. International Journal of Computer Science & Mobile Computing 5(11), 29-36 (2016)
  2. Hindi, A., Dr. Dwairi, M., Alqadi, Z.: Analysis of Procedures used to Build an Optimal Fingerprint Recognition System. International Journal of Computer Science and Mobile Computing 9(2), 21-37 (2020) https://doi.org/10.47760/ijcsmc.2020.v09i11.002
  3. Rushdi Abu Zneit, R., Al-Azzeh, J. Alqadi, Z., Ayyoub, B., Sharadqh, A.: Using Color Image as a Stego-Media to Hide Short Secret Messages. International Journal of Computer Science and Mobile Computing, vol. 8, issue 6, pp. 106-123, 2019.
  4. Patel, K.: Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files. International Journal of Information Technology 11, 81--819 (2019). https://doi.org/10.1007/s41870-018-0271-4
  5. Rani, R., Sharma, G.: Review Paper on Data Hiding In 3D Barcode Image Using Steganography. International Journal of Advanced Research in Computer Science 8(5), 2271-2276 (2017)
  6. Ghodke, M., Mali, N.: FPGA Based Network Security Using Cryptography. International Research Journal of Engineering and Technology 3(3):469-71 (2016)
  7. Bhuvaneshwari, M., Tenmozhi, S.: A VLSI architecture for security based stenographic processor with AES algorithm. International Journal of Electrical and Computer Engineering; 1-6.
  8. Sukhraliya, V., Chaudhary, S.: Encryption and decryption using ASCII values with substitution array approach. International Journal of Advanced Research in Computer and Communication Engineering. 2(8) 3094-3097 (2013)
  9. Shaikh, A. P, Kaul, V.: Enhanced Security Algorithm using Hybrid Encryption and ECC. IOSR Journal of Computer Engineering (IOSR-JCE) 16(3), 80-85 (2014) https://doi.org/10.9790/0661-16348085
  10. Garg, SK.:, Modifed encryption and decryption using symmetric keys at two stages: Algorithm SKG 1.2. International Journal of Advanced Research in Computer Science and Electronics Engineering. 4(6),778-80 (2014)
  11. Enriquez, M., Garcia, D. W., Arboleda, E.:, Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems. Indian Journal of Science and Technology 10(27), 1-14 (2017) DOI: 10.17485/ijst/2017/v10i27/105001.
  12. Vijayalakshmi, C., Lavanya, L., Navya, C.: A Hybrid Encryption Algorithm Based On AES and RSA. International Journal of Innovative Research in Computer and Communication Engineering 4(1), 909-917 (2016)
  13. Li, P., Chen, Z., Yang, L. T., Zhao, L. , and Zhang, Q.: A Privacy-preserving High-order Neuro-fuzzy C-means Algorithm with Cloud Computing. Neurocomputing 256, pp. 82-89 (2017) https://doi.org/10.1016/j.neucom.2016.08.135
  14. Yin, S., and Liu, J.: A K-means Approach for Map-reduce Model and Social Network Privacy Protection. Journal of Information Hiding and Multimedia Signal Processing 7(6), 1215-1221 (2016)
  15. Zhang, Q., Yang, L. T., Chen, L. T. and Li, P.: High-order Possibilistic c-means Algorithms Based on Tensor Decompositions for Big Data in IoT. Information Fusion 39, 72-80 (2018) https://doi.org/10.1016/j.inffus.2017.04.002
  16. Teng, L., Li, H., Liu, J., and Yin, S.: An Efficient and Secure Cipher-text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-attribute Sorting Method. International Journal of Network Security 20(5), 872-878 (2018)
  17. Elgendy, I., Zhang, W., Liu, C., and Hsu, C.: An Efficient and Secured Framework for Mobile Cloud Computing. IEEE Transactions on Cloud Computing 9(1), 79-87 (2018) https://doi.org/10.1109/TCC.2018.2847347
  18. B. Karthikeyan, T. Sasikala, and S. B. Priya, "Key exchange techniques based on secured energy efficiency in mobile cloud computing," Applied Mathematics & Information Sciences, vol. 13, no. 6, pp. 1039-1045, 2019. https://doi.org/10.18576/amis/130618
  19. Xu, J. Wei, L., Wu, W., Wang, A., Zhang, Y., and Zhou ,F.: Privacy-preserving Data Integrity Verification by using Lightweight Streaming Authenticated Data Structures for Healthcare Cyber-physical System. Future Generation Computer Systems 108, pp. 1287-1296 (2020) https://doi.org/10.1016/j.future.2018.04.018
  20. Haseeb, K., Almgren, A., Ud Din, I., Islam, N., and Altameem, A.: SASC: Secure and Authentication-based Sensor Cloud architecture for intelligent Internet of Things. Sensors 20(9), pp. 2468-2486 (2020) https://doi.org/10.3390/s20092468
  21. Zhu, H., Yuan, Y., Chen, Y., et al.: A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature. IEEE Access 7, pp.9003-90044 (2019)
  22. Zhang, Z., and Luo, J.: A Data Value Classification and Encryption Mechanism Based on Metadata Attributes. Journal of Northwest University 46(2) pp. 188-194 (2016)
  23. Liu, T., Liu, Y. Mao, Y. et al.: A Dynamic Secret-based Encryption Scheme for Smart Grid Wireless Communication. IEEE Transactions on Smart Grid 5(3), 1175-1182 (2014). https://doi.org/10.1109/TSG.2013.2264537