Abid Abdellah, Hicham Rrghout, Mourad Kattass, A. Jarjar, Abdellhamid Benazzi
{"title":"用于深度改进希尔图像编码的大 S 盒","authors":"Abid Abdellah, Hicham Rrghout, Mourad Kattass, A. Jarjar, Abdellhamid Benazzi","doi":"10.47679/ijasca.v3i1.42","DOIUrl":null,"url":null,"abstract":"This paper introduces a novel approach to encrypt color images, utilizing multiple chaotic maps and working with any size pixel blocks. The encryption procedure commences by converting the original image into a vector, which is then divided into equal dimension subblocks. These blocks undergo a new Vigenère transformation, employing two large dynamic substitution tables interconnected by an enhanced Hill operation using a large invertible matrix generated from a pseudo-random table, controlled by another binary dynamics table. Additionally, the truncated block undergoes the same encryption process using another pseudo-random invertible matrix. To evaluate the effectiveness and resilience of our algorithm, we conducted numerous simulations on randomly selected images of varying sizes and formats from diverse databases.","PeriodicalId":507177,"journal":{"name":"International Journal of Advanced Science and Computer Applications","volume":"4 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"big S-Boxes for Deeply Improved Hill Image Coding\",\"authors\":\"Abid Abdellah, Hicham Rrghout, Mourad Kattass, A. Jarjar, Abdellhamid Benazzi\",\"doi\":\"10.47679/ijasca.v3i1.42\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper introduces a novel approach to encrypt color images, utilizing multiple chaotic maps and working with any size pixel blocks. The encryption procedure commences by converting the original image into a vector, which is then divided into equal dimension subblocks. These blocks undergo a new Vigenère transformation, employing two large dynamic substitution tables interconnected by an enhanced Hill operation using a large invertible matrix generated from a pseudo-random table, controlled by another binary dynamics table. Additionally, the truncated block undergoes the same encryption process using another pseudo-random invertible matrix. To evaluate the effectiveness and resilience of our algorithm, we conducted numerous simulations on randomly selected images of varying sizes and formats from diverse databases.\",\"PeriodicalId\":507177,\"journal\":{\"name\":\"International Journal of Advanced Science and Computer Applications\",\"volume\":\"4 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Advanced Science and Computer Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47679/ijasca.v3i1.42\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Science and Computer Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47679/ijasca.v3i1.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper introduces a novel approach to encrypt color images, utilizing multiple chaotic maps and working with any size pixel blocks. The encryption procedure commences by converting the original image into a vector, which is then divided into equal dimension subblocks. These blocks undergo a new Vigenère transformation, employing two large dynamic substitution tables interconnected by an enhanced Hill operation using a large invertible matrix generated from a pseudo-random table, controlled by another binary dynamics table. Additionally, the truncated block undergoes the same encryption process using another pseudo-random invertible matrix. To evaluate the effectiveness and resilience of our algorithm, we conducted numerous simulations on randomly selected images of varying sizes and formats from diverse databases.