Binary decomposition-based image cipher algorithm with flexible method for key construction

Salim Muhsin Wadi, Huda Hussein Abed, Nada Taher Malik, Ahmed Taha Abdullsadah

Abstract


Image security is still one of the important fields in multimedia processing because it’s used in our daily lives. Watermarking, steganography, and ciphering are three directions to keep an image secret. Encryption defined as the process of changing information (which called plaintext) into an unreadable secret format (which called cipher-text). A new ciphering algorithm based on binary decomposition and binary codes conversion is proposed in this paper. The key is constructed in a flexible way based on the size of a secret image using some logical operations to increase the security levels. Three test images in different sizes were used to evaluate the performance of the proposed algorithm. The results of the visual scene and statistical factors proved that the suggested method was ciphering the image with high security. The proposed work was validated to confirm its effectiveness. As conclusions, the uses of decomposition and simple binary operations have given high-level image security. Also, key construction is an important step to face several types of attackers.

Keywords


ASCII codes pixels; Binary codes decomposition; Confidential images; Secret keys; Smart key constructions

Full Text:

PDF


DOI: http://doi.org/10.11591/ijeecs.v28.i1.pp201-208

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).

shopify stats IJEECS visitor statistics