Inicio  /  Applied Sciences  /  Vol: 13 Par: 6 (2023)  /  Artículo
ARTÍCULO
TITULO

Enhancing Image Encryption with the Kronecker xor Product, the Hill Cipher, and the Sigmoid Logistic Map

Dani Elias Mfungo    
Xianping Fu    
Xingyuan Wang and Yongjin Xian    

Resumen

In today?s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor product, Hill cipher, and sigmoid logistic Map. Our proposed algorithm begins by shifting the values in each row of the state matrix to the left by a predetermined number of positions, then encrypting the resulting image using the Hill Cipher. The top value of each odd or even column is used to perform an xor operation with all values in the corresponding even or odd column, excluding the top value. The resulting image is then diffused using a sigmoid logistic map and subjected to the Kronecker xor product operation among the pixels to create a secure image. The image is then diffused again with other keys from the sigmoid logistic map for the final product. We compared our proposed method to recent work and found it to be safe and efficient in terms of performance after conducting statistical analysis, differential attack analysis, brute force attack analysis, and information entropy analysis. The results demonstrate that our proposed method is robust, lightweight, and fast in performance, meets the requirements for encryption and decryption, and is resistant to various attacks.

 Artículos similares

       
 
Bo Zhao, Qifan Zhang, Yangchun Liu, Yongzhi Cui and Baixue Zhou    
In response to the need for precision and intelligence in the assessment of transplanting machine operation quality, this study addresses challenges such as low accuracy and efficiency associated with manual observation and random field sampling for the ... ver más
Revista: Applied Sciences

 
Can Li, Hua Sun, Changhong Wang, Sheng Chen, Xi Liu, Yi Zhang, Na Ren and Deyu Tong    
In order to safeguard image copyrights, zero-watermarking technology extracts robust features and generates watermarks without altering the original image. Traditional zero-watermarking methods rely on handcrafted feature descriptors to enhance their per... ver más
Revista: Applied Sciences

 
Shengkun Gu and Dejiang Wang    
Within the domain of architectural urban informatization, the automated precision recognition of two-dimensional paper schematics emerges as a pivotal technical challenge. Recognition methods traditionally employed frequently encounter limitations due to... ver más
Revista: Information

 
Jih-Ching Chiu, Guan-Yi Lee, Chih-Yang Hsieh and Qing-You Lin    
In computer vision and image processing, the shift from traditional cameras to emerging sensing tools, such as gesture recognition and object detection, addresses privacy concerns. This study navigates the Integrated Sensing and Communication (ISAC) era,... ver más

 
Touraj Farsadi, Majid Ahmadi, Melin Sahin, Hamed Haddad Khodaparast, Altan Kayran and Michael I. Friswell    
In the field of aerospace engineering, the design and manufacturing of high aspect ratio composite wings has become a focal point of innovation and efficiency. These long, slender wings, constructed with advanced materials such as carbon fiber and employ... ver más
Revista: Aerospace