Claim Missing Document
Check
Articles

Found 2 Documents
Search

New image encryption approach using a dynamic-chaotic variant of Hill cipher in Z/4096Z Rrghout, Hicham; Kattass, Mourad; Qobbi, Younes; Benazzi, Naima; JarJar, Abdellatif; Benazzi, Abdelhamid
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 5: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i5.pp5330-5343

Abstract

Currently, digital communication generates a considerable amount of data from digital images. Preserving the confidentiality of these images during transmission through network channels is of crucial importance. To ensure the security of this data, this article proposes an image encryption approach based on enhancing the Hill cipher by constructing pseudo-random matrices operating in the ring Z/212Z injected into a controlled affine transformation. This approach relies on the use of chaotic maps for generating matrices used in the encryption process. The use of the ring Z/212Z aims to expand the key space of our cryptosystem, thus providing increased protection against brute-force attacks. Moreover, to enhance security against differential attacks, a matrix of size (4×4), not necessarily invertible, is also integrated into a diffusion phase. The effectiveness of our technique is evaluated through specific tests, such as key space analysis, histogram analysis, entropy calculation, NPCR and UACI values, correlation analysis, as well as avalanche effect assessment.
Enhanced Vigenere encryption technique for color images acting at the pixel level Chemlal, Abdelhakim; Tabti, Hassan; El Bourakkadi, Hamid; Rrghout, Hicham; Jarjar, Abdellatif; Benazzi, Abdelhamid
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 6: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i6.pp6675-6688

Abstract

The pixel unit is an essential component of many encryption schemes. In the beginning two substitution tables, separately constructed from chaotic maps namely, the logistic map, slanted tent map, and the AJ map, which has a very high Lyapunov exponent and is very sensitive to start factors, are used to make modifications at the pixel level. These S-Boxes have a maximum period and are produced from several linear congruential generators. This approach uses newly developed confusion and diffusion functions connected to the recently built substitution tables to perform a refined Vigenere strategy. The purpose of this chaining is to defend the system from differential assaults. Extensive simulations on a variety of image formats and sizes confirm our process’s robustness against identified dangers.