A flexible image cipher based on orthogonal arrays (Q2126221): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(7 intermediate revisions by 6 users not shown)
Property / reviewed by
 
Property / reviewed by: Q807800 / rank
Normal rank
 
Property / Wikidata QID
 
Property / Wikidata QID: Q121031410 / rank
 
Normal rank
Property / reviewed by
 
Property / reviewed by: John F. Schmeelk / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: LSIC / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ins.2020.11.029 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3108950267 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Orthogonal Arrays of Index Unity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure image encryption algorithm design using a novel chaos based S-Box / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3411976 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symmetric Ciphers Based on Two-Dimensional Chaotic Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Orthogonal arrays. Theory and applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5787292 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On a Class of Arrangements / rank
 
Normal rank
Property / cites work
 
Property / cites work: Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theoretical Design and FPGA-Based Implementation of Higher-Dimensional Digital Chaotic Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design of image cipher using Latin squares / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 15:44, 28 July 2024

scientific article
Language Label Description Also known as
English
A flexible image cipher based on orthogonal arrays
scientific article

    Statements

    A flexible image cipher based on orthogonal arrays (English)
    0 references
    0 references
    14 April 2022
    0 references
    The paper is written in excellent chronological order by first introducing several research papers from the bibliography on image encryption and chaotic systems. The authors point out the paper of Rao who introduced orthogonal arrays in the 1940s. I feel some of the work of Turing also plays a part in breaking encryptions. They also point out that cryptosystems are defined on finite sets whereby chaotic systems have meaning on the real number field. The paper moves forward on how to enhance higher levels of security of the cryptosystem. A previous historical technique uses Latin Squares. A Latin Square is an \(n\times n\) array comprised of a set of symbols. Each row and column of the array contains each symbol the same number of times. The authors introduce a combinatorial configuration of an orthogonal array to image encryption. They define an orthogonal array of size \(n\), with \(q\) constraints, \(s\) levels and strength \(t\), denoted \(OA(n,q,s,t)\). They nicely include an example for a transpose of an array to be \(OA(9,4,3,2)\) having \(9\) rows, \(4\) columns, \(s=\{1,2,3\}\) symbols, which generates \(9\) distinct ordered pairs. The distinct \(9\) ordered pairs appear exactly once in any two columns. Then any two columns of the \(OA(9,4,3,2)\) can generate a 2D: \(1\) to \(1\) mapping and the authors exhibit one such mapping in the paper. This sets the stage to generalize the methodology and software written contained in the paper. The methodology and software programs contained in the paper were developed by Ming Xu and the conceptualization by Zihong Tian. The paper includes five algorithms. The paper then goes into simulation results and efficiency analysis. The authors include six well-known images. The first image Lena contains a variety of gradations and textures that proved to be a challenge in processing algorithms. They include the images of histograms of the correlation distribution of plaintext, images of cipher images, and the correlation distribution of cipher images. The results then include a detailed analysis of the entropy analysis together with a detailed diffusion analysis together with a known chosen plaintext attack analysis. The algorithms include several keys which can be public or secret depending on how much security is needed. I find the paper a joy to read and review very deep notions of cyber security.
    0 references
    image cipher
    0 references
    orthogonal array
    0 references
    combinatorial configuration
    0 references
    parameters
    0 references

    Identifiers