Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.12.89

Rounds Reduction and Blocks Controlling to Enhance the Performance of Standard Method of Data Cryptography  

Abu-Faraj, Mua'ad M. (The University of Jordan)
Alqadi, Ziad A. (Albalaqa Applied University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.12spc, 2021 , pp. 648-656 More about this Journal
Abstract
Color digital images are used in many multimedia applications and in many vital applications. Some of these applications require excellent protection for these images because they are confidential or may contain confidential data. In this paper, a new method of data cryptography is introduced, tested, and implemented. It will be shown how this method will increase the security level and the throughput of the data cryptography process. The proposed method will use a secret image_key to generate necessary private keys for each byte of the data block. The proposed method will be compared with other standard methods of data cryptography to show how it will meet the requirements of excellent cryptography, by achieving the objectives: Confidentiality, Integrity, Non-repudiation, and Authentication.
Keywords
Cryptography; image_key; block; PK; MSE; PSNR; throughput; speedup;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Rushdi Abu Zneit, R., Al-Azzeh, J. Alqadi, Z., Ayyoub, B., Sharadqh, A.: Using Color Image as a Stego-Media to Hide Short Secret Messages. International Journal of Computer Science and Mobile Computing, vol. 8, issue 6, pp. 106-123, 2019.
2 Zhu, H., Yuan, Y., Chen, Y., et al.: A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature. IEEE Access 7, pp.9003-90044 (2019)
3 Zhang, Q., Yang, L. T., Chen, L. T. and Li, P.: High-order Possibilistic c-means Algorithms Based on Tensor Decompositions for Big Data in IoT. Information Fusion 39, 72-80 (2018)   DOI
4 Zhang, Z., and Luo, J.: A Data Value Classification and Encryption Mechanism Based on Metadata Attributes. Journal of Northwest University 46(2) pp. 188-194 (2016)
5 Garg, SK.:, Modifed encryption and decryption using symmetric keys at two stages: Algorithm SKG 1.2. International Journal of Advanced Research in Computer Science and Electronics Engineering. 4(6),778-80 (2014)
6 Li, P., Chen, Z., Yang, L. T., Zhao, L. , and Zhang, Q.: A Privacy-preserving High-order Neuro-fuzzy C-means Algorithm with Cloud Computing. Neurocomputing 256, pp. 82-89 (2017)   DOI
7 Teng, L., Li, H., Liu, J., and Yin, S.: An Efficient and Secure Cipher-text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-attribute Sorting Method. International Journal of Network Security 20(5), 872-878 (2018)
8 Xu, J. Wei, L., Wu, W., Wang, A., Zhang, Y., and Zhou ,F.: Privacy-preserving Data Integrity Verification by using Lightweight Streaming Authenticated Data Structures for Healthcare Cyber-physical System. Future Generation Computer Systems 108, pp. 1287-1296 (2020)   DOI
9 Hamdan, M., Subaih, B., Alqadi, Z.: Extracting Isolated Words from an Image of Text. International Journal of Computer Science & Mobile Computing 5(11), 29-36 (2016)
10 Enriquez, M., Garcia, D. W., Arboleda, E.:, Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems. Indian Journal of Science and Technology 10(27), 1-14 (2017) DOI: 10.17485/ijst/2017/v10i27/105001.   DOI
11 Liu, T., Liu, Y. Mao, Y. et al.: A Dynamic Secret-based Encryption Scheme for Smart Grid Wireless Communication. IEEE Transactions on Smart Grid 5(3), 1175-1182 (2014).   DOI
12 Vijayalakshmi, C., Lavanya, L., Navya, C.: A Hybrid Encryption Algorithm Based On AES and RSA. International Journal of Innovative Research in Computer and Communication Engineering 4(1), 909-917 (2016)
13 Yin, S., and Liu, J.: A K-means Approach for Map-reduce Model and Social Network Privacy Protection. Journal of Information Hiding and Multimedia Signal Processing 7(6), 1215-1221 (2016)
14 Elgendy, I., Zhang, W., Liu, C., and Hsu, C.: An Efficient and Secured Framework for Mobile Cloud Computing. IEEE Transactions on Cloud Computing 9(1), 79-87 (2018)   DOI
15 B. Karthikeyan, T. Sasikala, and S. B. Priya, "Key exchange techniques based on secured energy efficiency in mobile cloud computing," Applied Mathematics & Information Sciences, vol. 13, no. 6, pp. 1039-1045, 2019.   DOI
16 Haseeb, K., Almgren, A., Ud Din, I., Islam, N., and Altameem, A.: SASC: Secure and Authentication-based Sensor Cloud architecture for intelligent Internet of Things. Sensors 20(9), pp. 2468-2486 (2020)   DOI
17 Rani, R., Sharma, G.: Review Paper on Data Hiding In 3D Barcode Image Using Steganography. International Journal of Advanced Research in Computer Science 8(5), 2271-2276 (2017)
18 Sukhraliya, V., Chaudhary, S.: Encryption and decryption using ASCII values with substitution array approach. International Journal of Advanced Research in Computer and Communication Engineering. 2(8) 3094-3097 (2013)
19 Hindi, A., Dr. Dwairi, M., Alqadi, Z.: Analysis of Procedures used to Build an Optimal Fingerprint Recognition System. International Journal of Computer Science and Mobile Computing 9(2), 21-37 (2020)   DOI
20 Patel, K.: Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files. International Journal of Information Technology 11, 81--819 (2019). https://doi.org/10.1007/s41870-018-0271-4   DOI
21 Ghodke, M., Mali, N.: FPGA Based Network Security Using Cryptography. International Research Journal of Engineering and Technology 3(3):469-71 (2016)
22 Bhuvaneshwari, M., Tenmozhi, S.: A VLSI architecture for security based stenographic processor with AES algorithm. International Journal of Electrical and Computer Engineering; 1-6.
23 Shaikh, A. P, Kaul, V.: Enhanced Security Algorithm using Hybrid Encryption and ECC. IOSR Journal of Computer Engineering (IOSR-JCE) 16(3), 80-85 (2014)   DOI