{"title":"十进制和位级安全多媒体传输的组合","authors":"Mohamed Gabr, Hisham H. Hussein, Wassim Alexan","doi":"10.1109/MTTW56973.2022.9942582","DOIUrl":null,"url":null,"abstract":"The proliferation of multimedia production and exchange over the Internet has created a dire need for security measures to protect it. In this paper, we propose a hybrid method for the encryption of images. This kind of hybrid strategy calls for the application of two (varying in nature) components, arithmetic (in the form of a dot product operation applied on the decimal level) and bit-level operations (in the form of an application of a PRNG key data change), alongside an S-Box (as a confusion application element). The incorporation of an arithmetic component leads to the development of an encryption scheme that is fundamentally distinct from the majority of algorithms in the state-of-the-art. The proposed scheme demonstrates strong encryption performance, as can be seen from the results of the conducted tests.","PeriodicalId":426797,"journal":{"name":"2022 Workshop on Microwave Theory and Techniques in Wireless Communications (MTTW)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Combination of Decimal- and Bit-Level Secure Multimedia Transmission\",\"authors\":\"Mohamed Gabr, Hisham H. Hussein, Wassim Alexan\",\"doi\":\"10.1109/MTTW56973.2022.9942582\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The proliferation of multimedia production and exchange over the Internet has created a dire need for security measures to protect it. In this paper, we propose a hybrid method for the encryption of images. This kind of hybrid strategy calls for the application of two (varying in nature) components, arithmetic (in the form of a dot product operation applied on the decimal level) and bit-level operations (in the form of an application of a PRNG key data change), alongside an S-Box (as a confusion application element). The incorporation of an arithmetic component leads to the development of an encryption scheme that is fundamentally distinct from the majority of algorithms in the state-of-the-art. The proposed scheme demonstrates strong encryption performance, as can be seen from the results of the conducted tests.\",\"PeriodicalId\":426797,\"journal\":{\"name\":\"2022 Workshop on Microwave Theory and Techniques in Wireless Communications (MTTW)\",\"volume\":\"140 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Workshop on Microwave Theory and Techniques in Wireless Communications (MTTW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MTTW56973.2022.9942582\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Workshop on Microwave Theory and Techniques in Wireless Communications (MTTW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MTTW56973.2022.9942582","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Combination of Decimal- and Bit-Level Secure Multimedia Transmission
The proliferation of multimedia production and exchange over the Internet has created a dire need for security measures to protect it. In this paper, we propose a hybrid method for the encryption of images. This kind of hybrid strategy calls for the application of two (varying in nature) components, arithmetic (in the form of a dot product operation applied on the decimal level) and bit-level operations (in the form of an application of a PRNG key data change), alongside an S-Box (as a confusion application element). The incorporation of an arithmetic component leads to the development of an encryption scheme that is fundamentally distinct from the majority of algorithms in the state-of-the-art. The proposed scheme demonstrates strong encryption performance, as can be seen from the results of the conducted tests.