Literature DB >> 29608609

A novel encryption scheme for high-contrast image data in the Fresnelet domain.

Nargis Bibi1, Shabieh Farwa2, Nazeer Muhammad2, Adnan Jahngir2, Muhammad Usman3.   

Abstract

In this paper, a unique and more distinctive encryption algorithm is proposed. This is based on the complexity of highly nonlinear S box in Flesnelet domain. The nonlinear pattern is transformed further to enhance the confusion in the dummy data using Fresnelet technique. The security level of the encrypted image boosts using the algebra of Galois field in Fresnelet domain. At first level, the Fresnelet transform is used to propagate the given information with desired wavelength at specified distance. It decomposes given secret data into four complex subbands. These complex sub-bands are separated into two components of real subband data and imaginary subband data. At second level, the net subband data, produced at the first level, is deteriorated to non-linear diffused pattern using the unique S-box defined on the Galois field [Formula: see text]. In the diffusion process, the permuted image is substituted via dynamic algebraic S-box substitution. We prove through various analysis techniques that the proposed scheme enhances the cipher security level, extensively.

Entities:  

Year:  2018        PMID: 29608609      PMCID: PMC5880351          DOI: 10.1371/journal.pone.0194343

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.240


Introduction

Data encryption is an integral part of multimedia technologies. Usually, internet users require to deliver, obtain, or store secret information [1]. Extensive information exchange over internet demands safety from unwanted surveillance, thieving, and bogus publicity [2]. In this frame of reference, images are exposed to ciphers which are unrecognizable by the human eye [3]. The highest familiar way to escape from any trouble is to convert the confidential data into dummy formation [4]. The information appeared can only be restored by those who know the reverse scheme used to attain the initial pattern with exclusive key specification [5-13]. Data encryption enables data integrity, confidentiality, and data authentication [14]. This is achieved using a digital data encryption which transforms the meaningful information into dummy data. This strategy has been evolved to preserve the information and is heavily based on cryptography [4]. Cryptography is used for data confidentiality. Claud Shannon [15], introduced the substitution- permutation network (SPN), each layer of which uses substitution followed by permutation. Cryptographic procedures are helpful to preserve the secret information by scrambling it into an uncorrelated data [4]. Improved security and confidentiality can be served if the two schemes, confusion and diffusion, are joined together into one hybrid system [16-18]. The gradual development of cryptographic systems witnesses the worth of the substitution box (S − box). It plays the role of a standout in symmetric key cryptography and a predominant source to produce nonlinearity [1, 19]. The indispensable involvement of the S-box demands new construction algorithms and the recent literature introduces some safer and more reliable S-boxes [1, 2, 20–24]. Further applications of S boxes in digital image ciphering, water marking as well as in steganography have become quite popular as well [3, 25–30]. In this work, we propose an efficient strategy that uses the algebraic properties of the Galois field to structure an S-box which exhibits extra-ordinary features as compared to some prevailing designs at a very low computational labour. In recent literature, many innovative and advanced techniques of image encryption have become pivot of attention. Liu and Wang introduced image encryption algorithms based on one-time keys [31] and spatial bit-level permutations along with chaotic systems [32]. In [33], a chaotic encryption scheme based on perceptron model is proposed. [34] describes an encryption strategy using DNA complementary rule with chaos. Some of the most recent image encryption techniques are detailed in [35-42]. However, according to our learning there is no previous work on the applications of the Fresnelet transform in conjunction with S-box cryptography. In this paper, we use the cryptography to manipulate the significant information of the secret data. Later part of this paper is ordered as follows. Section Fresnelet Transform provides a theoretical explanation of the Fresnelet transform. Section Algorithm for algebraic S-box describes the detailed algorithm used to develop an algebraic S-box. The cryptographic forte of the S-box is examined in Performance analysis of S-box, through some highly significant parameters. The remaining study present a comprehensive model for encryption and decryption, including simulations and evaluations. Lastly, Conclusion Section concludes the paper.

Fresnelet transform

The propagation phenomena of wave are structured via diffraction principle using the Fresnel transform [43]. The Fresnel transform in wavelet domain produces the bases of Fresnelet transform. These bases are used to reconstruct the digital off axis hologram with certain composition of parameters. The parameters can be tuned to desired value of the resolution scale, adjusted with particular wavelength and the specific distance between observing plane to the propagating objects. Fresnelet transform is demonstrated to simulate the approximation the monochromatic waves propagation. Propagation of monochromatic waves is shown as a function , with the Fresnel transform model in terms of convolution integral as follows: The kernel k(p) is the one-dimensional prorogation model with given parameter τ > 0 in (2), where, τ depends on the propagating distance d, based on the wavelength value λ as shown: Moreover, the kernel k(p) can be extended to two-dimensional wave propagation using the tensor product for , as follows: The K(p, q) is also known as the separable kernel to cover the two-dimensional Fresnel transform’s family [14]. To obtain the precise reconstruction of decomposed data, the Fresnel transform unitary property facilitates, prominently. Furthermore, the extension of the separable nature of one-dimensional wavelet transform into two-dimensional wavelet transform can be achieved using the Riesz basis [43]. The Riesz basis for of a two-parameter can be defined on as family of the wavelet transform can be defined in terms of convolution integrals, such that where, the Haar wavelet is used as an orthonormal basis generation for . This is the simplest form of a multi-resolution decomposition by the wavelet transform, and can be used to get the desired reconstruction of the input original data as well [44]. This composition leads to the Fresnelet basis using the the Haar wavelet in combination of the Fresnel transform as follows: For constant value of τ, an orthonormal basis in terms of Fresnelet transform can be obtained using: , as follows: The coefficients representation using Fresnelet is done by ν in (9). Moreover, the separable nature is extended the Fresnelet transform’s from one-dimensional data to two-dimensional data. Following this, the four combinations are obtained using the tensor product for producing the approximation (lower-lower subband) and three high frequency details (lower-high subband, high-lower subband, and high-high subband) as follow: In (10)–(13), the representation of scaling functions is done using x and representation of the wavelet functions is done using y. These functions are established a low-low filter in (10) and high details filter in (11)–(13). Following this, the four Fresnelet coefficients are generated using the basis function μ to data Λ, as follows: The low-low filter data is demonstrated using the coefficient measure and the high-details data are represented using the coefficients measure , , and , respectively. Theses Fresnelet coefficients are used to propagate the input image data. It transforms the input image data from meaningful information to dummy image using the Fresnelet forward transform in the form four complex subbands data [14]. The Fresnelet transform unitary property is used in reconstruction of secret data by applying the conjugate transpose to encrypted data as shown in Fig 1. This outcome has a complex form of decrypted data. The decomposition stage of secret data of USAF image is shown in first row of Fig 2 as a 4 subbands based on the Forward Fresnelet transform with distance d1. The marked area in first row is demonstrated in second row as a zoomed-in region. This show the diffusion of meaningful data into meaning less dummy data. The inverse propagation of the first row of Fig 1 is propagated at distance d2. This inverse processing is termed as inverse Fresnelet transform. The four subbands in Fig 1(i)–1(l) are merged into complex data formation as a single image and its magnitude is shown in first image of Fig 2. The communication of encrypted data in digital form is distributed into real parts only. Therefore, the complex data is partition into two parts: real part a and magnitude of imaginary part b (in second and third image of Fig 2). Moreover, on reconstruction stage the imaginary part b (magnitude value) with i is added up into a (real value) to obtain the complex data using inverse process.
Fig 1

Fresnelet transform encryption of the given data USAF where the the magnitude of it is obtained using the Fresnelet coefficients with key parameter d1 = 1m as follows.

(first row) approximation, horizontal data, vertical data, and diagonal data. (Second row) shows the zooming vision of the corresponding images listed in the first row. (Last row) represents the inverse magnitude using Fresnelet transformed data to the four subbands listed in the first row using key d2 = .01cm.

Fig 2

The scrambled information in last row of Fig 1 is reconstructed by combining all subband data is demonstrated in (A). It’s pixel value is composed in terms of the magnitude with complex valued data. The (B) and (C) are the real and imaginary parts of the dummy data displayed in (A). (D) The reconstructed image usaf is obtained using Fresnelet transform application with same parameter keys as in encryption case.

Fresnelet transform encryption of the given data USAF where the the magnitude of it is obtained using the Fresnelet coefficients with key parameter d1 = 1m as follows.

(first row) approximation, horizontal data, vertical data, and diagonal data. (Second row) shows the zooming vision of the corresponding images listed in the first row. (Last row) represents the inverse magnitude using Fresnelet transformed data to the four subbands listed in the first row using key d2 = .01cm. The scrambled information in last row of Fig 1 is reconstructed by combining all subband data is demonstrated in (A). It’s pixel value is composed in terms of the magnitude with complex valued data. The (B) and (C) are the real and imaginary parts of the dummy data displayed in (A). (D) The reconstructed image usaf is obtained using Fresnelet transform application with same parameter keys as in encryption case. To transfer the given data with huge isolation and upgraded discreetness, the presented method implies the Fresnelet transform that holds distance parameters and the wavelength as keys, that are necessary for reconstruction of the correct information. Furthermore, the initial pattern of the information data is obtained in the reconstruction stage with the accurate parameters use during the inverse Fresnelet procedures.

Algorithm for algebraic S-box

In this section, we describe the algorithm used for construction of our S-box. Generally, S-box is considered as the most influential component to produce the nonlinearity effect that relates to the confusion creating capability in ciphering. In order to grasp the structural properties of an S-box, we first need to go through some fundamental facts. An n × n S-box can be defined as a vector Boolean function . The algebraic structure of the background Galois field used to construct an S-box, plays very basic role. For the underlying construction of 8 × 8 S-box, we use with is a degree 8 irreducible polynomial. It is worth mentioning that in advanced encryption standard, AES S-box algorithm uses based on X8 + X4 + X3 + X + 1. In fact, any degree 8 irreducible generating polynomial could be used for the field but this choice obviously affects the calculations. We define the general linear group as a group formed by all n × n invertible matrices over the field . A projective general linear group of degree n over a field is defined to be the quotient of by its center. For this paper, we form the 8 × 8 S-box by considering the action of the aforementioned Galois field on , i.e. we take a function defined as In above expression, f is known as a linear fractional transformation (LFT) with a1, a2, a3 and satisfying the condition a1 a4 − a2 a3 ≠ 0. The algebraic complexity and nonlinearity of LFT gives incentive to deploy this for the process of byte substitution. For our S-box, in particular, we choose a1 = 21, a2 = 8, a3 = 3 and a4 = 17. The images of this map produce our S-box as shown in Table 1. This highly nonlinear S-box attains the nonlinearity measure 112 that is quite similar to the recent state-of-the-art AES S-box but it utilizes a straightforward and comparatively simple approach as compared to the AES S-box. In the following section we use some highly significant analysis techniques to figure out the cryptographic strength of our S-box.
Table 1

LFT-based S-box.

215931712323476201236175591412149916210874
1679733623595521602425516163110225241
1451532452547317118901732117817694122136114
7217743585611184149120127185372431576910
18992770196222422318116878186207195148190
50662670238112132248221462532102188247170
19418745532138662242001151116821240140130
10416398821193171542551558115852194264
2080129211881601562181231092041071920512216
10684301692284424913512422915923267133126101
1371003814414311629134244180224217331136210
20315822166791381051641832406519120919727251
150227239511261541654823723314741193252198
206230258789284716151963517257152199139
22011724671208341211383321281033914675167
14179131912261822311741849142589192202

Performance analysis of S-box

In this section, we analyze the proposed S-box through some widely accepted parameters. The detailed analysis is presented in the following subsections. We compare the results with the famous S-boxes, as named earlier.

Nonlinearity

The nonlinearity is a measure of the minimum distance of the reference function from the set of all the affine functions [2]. The average nonlinearity value for the proposed S-box is 112. A comparison of nonlinearity measure with some formerly prevailing S-boxes is shown in Table 2. Clearly, the nonlinearity of the proposed S-box matches the best attained figure.
Table 2

Comparison of performance indices of different S-boxes with LFT S-box.

S-boxNonlinearitySACBICDPLP
Proposed1120.5102541120.0156250.0625
AES1120.5058112.00.01560.062
APA1120.4987112.00.01560.062
Gray1120.5058112.00.01560.062
Skipjack105.70.4980104.10.04680.109
Xyi1050.5048103.70.04680.156
RP99.50.5012101.70.28100.132

Strict avalanche criterion

This criterion is used to gauge the confusion creating capability of an S-box. A function would be regarded to satisfy SAC if a single input-bit change assures change in 50% output-bits. The results presented in Table 2, shows that our S-box fulfils the requirements of SAC.

Linear and differential approximation probabilities

This is a measure of the unevenness of an event, mathematically defined by: where x represents all possible inputs to the S-box and Γ and Γ give the parity of the input and output bits respectively. We further use the differential approximation probability, which determines the differential uniformity of an S-box. Its mathematical expression is given by; Here Δx and Δy represent the input and out put differentials respectively. The smaller LP and DP measures guarantee the stronger S-box.

Bit independence criterion

In bit independence criterion, input bits are altered exclusively, and then output bits are scrutinized for their independence. Bit independence has great worth in cryptographic structures. The goal of reaching the maximum complexity and perplexity in a system can be achieved through this property of increasing independence between the bits. In cryptographic systems, the increased independence between bits is an essential requirement as it makes harder to understand and forecast the design of the system. The results of BIC are compared in Table 2. It is evident that, in BIC, our S-box has similarity with the Xyi S-box. Based on the performance evaluation of the newly designed S-box, it is evident that the S-box shows extra-ordinary results and can be considered for further multimedia applications.

Encryption method

The secret image is encrypted to keep the confidential information, the Fresnelet transform is employed based on the wavelet family, known as Haar. At first, the secret image Λ is propagated using the Fresnelet transform Δ at the distance d1 = 1m, as follow: In the second phase, a scrambled data ψ is generated from the components of decomposed image Λ using the IΔ (inverse Fresnelet transform) at a distance, d2 = 10−2 m, as follow: The encrypted data from the secrete image are obtained in Fig 2 in form of complex properties of the Fresnelet transform. Moreover, complex data is separated into the imaginary part ψ and the real part ψ for getting unique pattern of non-linear pattern using S-box.

Single unit dummy data

To manage the data the encrypted dummy data, we employ the inverse wavelet transform (WT) for reconstructing the two parts (real and imaginary) into single unit dummy data. The inverse wavelet with the Haar transform is employed. The subband data C0 is the low-passed and the diagonal detail zeros valued data. The maximum intensity values of image of horizontal detail and the vertical detail are used α1.D data and α2.D to derive the α1 and α2 as encryption normalization values. A scale parameter α is presented as a strength factor which regulates the participation of scrambled dummy data for getting single unit dummy data as follow: The above reconstruction process with the inverse wavelet transform (IWT) gives an information dummy data E after uniting the real and imaginary parts of D in reconstruction phase.

S-Box encryption

A typical 512 × 512 image of Signature, 256 × 256 image of DDNT, and 256 × 256 image of USAF are encrypted using the proposed method. We use the inverse of S-box to decrypt the ciphered image. Fig 3(A), 3(B) and 3(C) show the true, encrypted and the decrypted image of Signature. Figs 4 and 5 show the encrypted and the decrypted image of DDNT and USAF information data using S-box and the proposed method. One can see that our algorithm is capable to recover the true secret image with high accuracy as measured out in terms of coefficient correlation.
Fig 3

S-box image encryption and decryption of signature image (Signature image is taken from flicker image database: 293 https://www.flickr.com/photos/wyncliffe/14353455608/in/photostream/.) with various range of gray values

(A) original image, (B) encrypted image, and (C) decrypted image, respectively.

Fig 4

Visual and gradient estimation of S-box and propose method for highly contrast image (DDNT).

(A) true image, (B) S-box encrypted image, (C) proposed method encrypted image, (D) decrypted image using inverse S-box, (E) decrypted image using inverse proposed method, (F)—(G) histogram gradient estimation of information data listed in first row from (A)-(E).

Fig 5

Visual and gradient estimation of S-box and proposed method for medium contrast image (USAF).

(A) true image, (B) S-box encrypted image, (C) proposed method encrypted image, (D) decrypted image using inverse S-box, (E) decrypted image using inverse proposed method, (F)—(G) histogram gradient estimation of information data listed in first row from (A)-(E).

S-box image encryption and decryption of signature image (Signature image is taken from flicker image database: 293 https://www.flickr.com/photos/wyncliffe/14353455608/in/photostream/.) with various range of gray values

(A) original image, (B) encrypted image, and (C) decrypted image, respectively.

Visual and gradient estimation of S-box and propose method for highly contrast image (DDNT).

(A) true image, (B) S-box encrypted image, (C) proposed method encrypted image, (D) decrypted image using inverse S-box, (E) decrypted image using inverse proposed method, (F)—(G) histogram gradient estimation of information data listed in first row from (A)-(E).

Visual and gradient estimation of S-box and proposed method for medium contrast image (USAF).

(A) true image, (B) S-box encrypted image, (C) proposed method encrypted image, (D) decrypted image using inverse S-box, (E) decrypted image using inverse proposed method, (F)—(G) histogram gradient estimation of information data listed in first row from (A)-(E).

The decryption process

The opposite of an encryption process is decryption process. The wavelet transform (WT) is considered to decompose the encrypted data image E into four subband data sets , , , and . The high frequency subband data and are carrier (communication) data sets that are preserved in the same position. The final data are split by α so that the scrambled information data of same values are obtained. The retrieved imaginary and real parts of the scrambled data are rejoined in complex data pattern. Lastly the obtained complex scrambled data is refined by the inverse Fresnelet transforms applying the exact keys specification of the Fresnelet transform for the sake of obtaining the private information image on employing the inverse cipher S-box.

Statistical analysis

In this section we gauge the security strength of the proposed algorithm by using some most significant statistical analysis, s described below. Entropy: Entropy analysis measures the randomness of a system. Table 3, represents the information entropy for different images (both original and the encrypted). It is obvious that the results favor the proposed methodology.
Table 3

Statistical analysis.

ImageTestSignaturetrueSignatureencryptedDDNTtrueDDNTencryptedUSAFtrueUSAFencrypted
Entropy7.44517.75120.01040.016090.41901.1379
Contrast0.21008.69470.036020.00460.5509-0.0014
Correlation0.94440.11690.59280.03800.83300.8036
Homogeneity0.90840.45240.99930.99960.99930.9284
Contrast: The contrast analysis is used to identify objects in an image. The numerical results for contrast of t images true and encrypted images are arranged in Table 3, which show that the proposed scheme is efficient. Correlation: The correlation coefficient, between the pixels at the same indices in both the plain and the encrypted image, measures the similarity between the pixels pattern of both images. Results arranged in Table 3 witness effectiveness of the proposed method. Homogeneity: The homogeneity analysis determines the closeness of the elements distribution in the gray level co-occurrence matrix (GLCM) to GLCM diagonal. Differential analysis: A desirable feature of an encryption algorithm is to show high sensitivity to single-bit change in the plain image. For this purpose two measures, NPCR and UACI, are commonly used. NPCR stands for the number of pixels change rate of image as a result of one pixel change in the plain image. However UACI means unified average intensity of differences between the plain and the encrypted images. In our case, the NPCR is over 99% and the UACI is over 33%. These results prove that our algorithm is highly sensitive and robust against the differential attacks and even single-bit difference in two plain image results in absolutely different encrypted images.

Simulation and evaluation

In the given process, we deal with a sampling interval size Δ = 10 nm of a hypothetical CCD plane, a wavelength λ = 632.8 nm (nm = nanometer), and distances d1 = 1m (m = meter) and d2 = 10−4 m [14]. These parameters are employed in the Fresnelet transform operations for the encryption as well as decryption stages and are considered as the key parameters. The obtained information images are predicted through the evaluation of correlation coefficients (CC) with the original information image data. The index of CC followed with in the range of 0 to 1. 0 value show almost no correlation between original and decrypted image while 1 reflect almost same out compare to original image. To analyze the presented algorithm, our main focus on encryption analysis. The decrypted out put is almost clear with average value in terms of coefficient correlation value (0.9995). Notice from Table 3 that the given scheme provides good encryption of secret information data as compared to ordinary S-box encryption methods [2].

Processing speed

It is an important feature of an efficient encryption algorithm to elapse lesser processing time. We tested our algorithm on MATLAB R-2016a, with i5 − 2520M CPU 2.50 GHZ and 8GB memory and the results are presented in Table 4. it is evident that our scheme is quite efficient.
Table 4

UACI, NPCR and Time.

SignatureDDNTUSAF
UACI33.711333.672133.1214
NPCR99.314599.781399.7162
Time (Sec)0.61280.60310.6114

Classical attacks

By Kerckhoff’s principle, a sscure cryptosystem is one which can’t be broken even if everything is known, except for the secret key. Keeping this fact in view, classically, there are four main attacks [36], that are worth-studying. Ciphertext only attack: When a string of ciphertext is known to the attacker. Known Plaintext attack: When a string of plaintext along with the corresponding ciphertext is known to the attacker. Chosen plaintext attack: When attacker has temporary access to the encryption mechanism such that he can choose a plaintext string and obtain its ciphered version. Chosen ciphertext attack: When attacker has temporary access to the decryption mechanism such that he can choose a ciphertext string and can obtain its corresponding plaintext string. Among the above-mentioned attacks, Chosen ciphertext attack is of highest importance. If a cryptosystem can resist this attack, it would surely resist the other attacks as well [36, 40]. Obviously the proposed scheme is highly sensitive to the subband-distribution, the irreducible monic polynomial used to construct the background Galois field and the S-box parameters a1, a2, a3 and a4. Minor change in these will cause serious effects on the outcome and therefore our scheme is quite safe against the aforementioned attacks.

Conclusion

To overcome the drawback of general S-box encryption in highly contrast data, this paper presents a new encryption approach with improved cipher security of the encrypted data. The proposed method is considered better approach for two significant reasons. First, the Fresnelet transform is used for encrypting the data of information image with various distance parameters as key. Second, the algebraic s-box provide highly nonlinearity in an encrypted data. Experimental studies validate that an encryption of digital image using the proposed scheme shown great superiority over the recently existing encryption methods. Although the proposed method in this study intents at the image encryption, however, its limitation does not restrict it to only this area and can be significantly implied in various fields of security information.

Supporting information

Data Availability Statement: Signature image is taken from flicker image database: https://www.flickr.com/photos/wyncliffe/14353455608/in/photostream/. The person who associated a work with this deed has dedicated the work to the public domain by waiving all of his or her rights to the work worldwide under copyright law, including all related and neighboring rights, to the extent allowed by law. You can copy, modify, distribute and perform the work, even for commercial purposes, all without asking permission. Rest of the data used in the proposed method are available within the paper.
  7 in total

1.  A novel classification scheme to decline the mortality rate among women due to breast tumor.

Authors:  Bushra Mughal; Muhammad Sharif; Nazeer Muhammad; Tanzila Saba
Journal:  Microsc Res Tech       Date:  2017-11-16       Impact factor: 2.769

2.  Blind data hiding technique using the Fresnelet transform.

Authors:  Nazeer Muhammad; Nargis Bibi; Zahid Mahmood; Dai-Gyoung Kim
Journal:  Springerplus       Date:  2015-12-30

3.  Equation-Method for correcting clipping errors in OFDM signals.

Authors:  Nargis Bibi; Anthony Kleerekoper; Nazeer Muhammad; Barry Cheetham
Journal:  Springerplus       Date:  2016-06-30

4.  A highly nonlinear S-box based on a fractional linear transformation.

Authors:  Shabieh Farwa; Tariq Shah; Lubna Idrees
Journal:  Springerplus       Date:  2016-09-26

5.  Reversible integer wavelet transform for blind image hiding method.

Authors:  Nazeer Muhammad; Nargis Bibi; Zahid Mahmood; Tallha Akram; Syed Rameez Naqvi
Journal:  PLoS One       Date:  2017-05-12       Impact factor: 3.240

6.  On Forgotten Topological Indices of Some Dendrimers Structure.

Authors:  Yasir Bashir; Adnan Aslam; Muhammad Kamran; Muhammad Imran Qureshi; Adnan Jahangir; Muhammad Rafiq; Nargis Bibi; Nazeer Muhammad
Journal:  Molecules       Date:  2017-05-24       Impact factor: 4.411

7.  Sphingosine 1-Phosphate Receptor Modulator Fingolimod (FTY720) Attenuates Myocardial Fibrosis in Post-heterotopic Heart Transplantation.

Authors:  Naseer Ahmed; Daniele Linardi; Nazeer Muhammad; Cristiano Chiamulera; Guido Fumagalli; Livio San Biagio; Mebratu A Gebrie; Muhammad Aslam; Giovanni Battista Luciani; Giuseppe Faggian; Alessio Rungatscher
Journal:  Front Pharmacol       Date:  2017-09-15       Impact factor: 5.810

  7 in total
  6 in total

1.  Correction: A novel encryption scheme for high-contrast image data in the Fresnelet domain.

Authors:  Nargis Bibi; Shabieh Farwa; Nazeer Muhammad; Adnan Jahngir; Muhammad Usman
Journal:  PLoS One       Date:  2018-04-26       Impact factor: 3.240

2.  Correction: A novel encryption scheme for high-contrast image data in the Fresnelet domain.

Authors:  Nargis Bibi; Shabieh Farwa; Nazeer Muhammad; Adnan Jahngir; Muhammad Usman
Journal:  PLoS One       Date:  2018-11-26       Impact factor: 3.240

3.  Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps.

Authors:  Congxu Zhu; Guojun Wang; Kehui Sun
Journal:  Entropy (Basel)       Date:  2018-11-03       Impact factor: 2.524

4.  A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field.

Authors:  Nasir Siddiqui; Fahim Yousaf; Fiza Murtaza; Muhammad Ehatisham-Ul-Haq; M Usman Ashraf; Ahmed M Alghamdi; Ahmed S Alfakeeh
Journal:  PLoS One       Date:  2020-11-12       Impact factor: 3.240

5.  An Image Encryption Algorithm Based on Time-Delay and Random Insertion.

Authors:  Xiaoling Huang; Guodong Ye
Journal:  Entropy (Basel)       Date:  2018-12-15       Impact factor: 2.524

6.  A strong construction of S-box using Mandelbrot set an image encryption scheme.

Authors:  Mazzamal Aslam; Saira Beg; Adeel Anjum; Zakria Qadir; Shawal Khan; Saif Ur Rehman Malik; Ma Parvez Mahmud
Journal:  PeerJ Comput Sci       Date:  2022-09-09
  6 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.