期刊论文详细信息
IEEE Access
A Technique for Securing Multiple Digital Images Based on 2D Linear Congruential Generator, Silver Ratio, and Galois Field
Liang Zhou1  Arvind Dhaka2  Abdul Gaffar3  Anand B. Joshi3  Sonali Singh3  Vishnu Narayan Mishra4  Lakshmi Narayan Mishra5  Hamurabi Gamboa Rosales6 
[1] Center for Medicine Intelligent and Development, China Hospital Development Institute, Shanghai Jiao Tong University, Shanghai, China;Department of Computer and Communication Engineering, Manipal University Jaipur, Jaipur, India;Department of Mathematics and Astronomy, University of Lucknow, Uttar Pradesh, Lucknow, India;Department of Mathematics, Indira Gandhi National Tribal University, Madhya Pradesh, Amarkantak, India;Department of Mathematics, School of Advanced Sciences, Vellore Institute of Technology (VIT) University, Tamil Nadu, Vellore, India;Faculty of Electrical Engineering, Autonomous University of Zacatecas, Zacatecas, Mexico;
关键词: Digital images;    multiple image encryption;    2D Linear Congruential Generator (LCG);    silver ratio;    Galois field;   
DOI  :  10.1109/ACCESS.2021.3094129
来源: DOAJ
【 摘 要 】

Security of multiple digital images over an unsecured channel is a current area of research in the field of image cryptography. Several techniques have been proposed for this purpose. However, the main drawbacks of the existing techniques are as follows: the existing techniques can be applied merely to the grayscale or the truecolor images; the size of the cipher (output) image is bigger than that of the plain (input) images; the authors have used a large number of parameters in the encryption/decryption process, besides the secret key; and the cipher/decipher rounds use the same key for encryption/decryption process. The proposed technique, which is based on a two-dimensional (2D) Linear Congruential Generator (LCG), silver ratio, and Galois field, is designed not merely to secure multiple digital images, namely, three truecolor, nine grayscale, and seventy-two binary images of different sizes, simultaneously, but also to address the above drawbacks. The designed technique achieves both confusion and diffusion properties essential for a secure cryptosystem. Also, the technique is empirically assessed via several statistical and security evaluation metrics, such as key sensitivity, histogram, chi-square, entropy, number of pixel change rate, structural similarity index measure, processing time, etc. The results of these evaluation metrics prove the efficiency and robustness of the designed technique.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次