How to cite this paper
Abu-Faraj, M., Al-Hyari, A., Altaharwa, I., Alqadi, Z & Ali, B. (2023). Increasing the security of transmitted text messages using chaotic key and image key cryptography.International Journal of Data and Network Science, 7(2), 809-820.
Refrences
Abu-Faraj, Alqadi, Z., Al-Ahmad, B., Aldebei, K., & Ali, B. (2022). A Novel Approach to Extract Color Image Features Using Image Thinning. Applied Mathematics, 16(5), 665-672.
Abu-Faraj, M. a., Al-Hyari, A., & Alqadi, Z. (2022). A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography. Symmetry, 14(4), 664.
Abu-Faraj, M. a. M., & Alqadi, Z. A. (2021a). Improving the Efficiency and Scalability of Standard Methods for Data Cryptography. International Journal of Computer Science & Network Security, 21(12spc), 451-458.
Abu-Faraj, M. a. M., & Alqadi, Z. A. (2021b). Rounds Reduction and Blocks Controlling to Enhance the Performance of Standard Method of Data Cryptography. International Journal of Computer Science & Network Security, 21(12spc), 648-656.
Al-Hyari, A., Al-Taharwa, I., Al-Ahmad, B., & Alqadi, Z. (2022). CASDC: A Cryptographically Secure Data System Based on Two Private Key Images. IEEE Access, 10, 126304-126314.
Al-Hyari, A., Aldebei, K., Alqadi, Z. A., & Al-Ahmad, B. (2022). Rotation left digits to enhance the security level of message blocks cryptography. IEEE Access, 10, 69388-69397.
Biryukov, A., & De Cannière, C. (2011). Data encryption standard (DES). Encyclopedia of Cryptography and Security, 295-301.
Elmanfaloty, R. A., & Abou-Bakr, E. (2020). An image encryption scheme using a 1D chaotic double section skew tent map. Complexity, 2020.
Fang, D., & Sun, S. (2020). A new secure image encryption algorithm based on a 5D hyperchaotic map. PloS one, 15(11), e0242110.
Furht, B. (2008). Encyclopedia of multimedia: Springer Science & Business Media.
Idbeaa, T., Abdul Samad, S., & Husain, H. (2016). A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme. PloS one, 11(3), e0150732.
Kang, D., Jung, J., Lee, D., Kim, H., & Won, D. (2017). Security analysis and enhanced user authentication in proxy mobile IPv6 networks. PloS one, 12(7), e0181031.
Karule, K. P., & Nagrale, N. V. (2016). Comparative analysis of encryption algorithms for various types of data files for data security. International Journal of Scientific Engineering and Applied Science, 2(2), 495-498.
Khan, M., Masood, F., Alghafis, A., Amin, M., & Batool Naqvi, S. I. (2019). A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PloS one, 14(12), e0225031.
Khan, M., & Waseem, H. M. (2018). A novel image encryption scheme based on quantum dynamical spinning and rotations. PloS one, 13(11), e0206460.
Kharel, R., Busawon, K., & Ghassemlooy, Z. (2011). Modified chaotic shift keying using indirect coupled chaotic synchronization for secure digital communication Chaos Theory: Modeling, Simulation and Applications (pp. 207-214): World Scientific.
Mua'ad, M., & Zubi, M. (2020). Analysis and implementation of kidney stones detection by applying segmentation techniques on computerized tomography scans. Italian Journal and Applied Mathematics(43-2020), 590-602.
Mua’ad, M., Aldebei, K., & Alqadi, Z. A. (2022). Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography. Traitement du Signal, 39(1), 173-178.
Pavithra, S., & Ramadevi, E. (2012). Study and performance analysis of cryptography algorithms. International Journal of Advanced Research in Computer Engineering & Technology, 1(5), 82-86.
Rachh, R. R., Mohan, P., & Anami, B. S. (2012). Efficient implementations for AES encryption and decryption. Circuits, Systems, and Signal Processing, 31(5), 1765-1785.
Sohal, M., & Sharma, S. (2022). BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. Journal of King Saud University-Computer and Information Sciences, 34(1), 1417-1425.
Thiyagarajan, B., & Kamalakannan, R. (2014). Data integrity and security in cloud environment using AES algorithm. Paper presented at the International Conference on Information Communication and Embedded Systems (ICICES2014).
Usama, M., & Zakaria, N. (2017). Chaos-based simultaneous compression and encryption for Hadoop. PloS one, 12(1), e0168207.
Vijayalakshmi, C., Lavanya, L., & Navya, C. (2016). A Hybrid Encryption Algorithm Based On AES and RSA. International Journal of Innovative Research in Computer and Communication Engineering, 4(1), 909-917.
Wang, C., Li, Y., Xia, X., & Zheng, K. (2014). An efficient and provable secure revocable identity-based encryption scheme. PloS one, 9(9), e106925.
Wang, J., & Kissel, Z. A. (2015). Introduction to network security: theory and practice: John Wiley & Sons.
Wu, X., Li, Y., & Kurths, J. (2015). A new color image encryption scheme using CML and a fractional-order chaotic system. PloS one, 10(3), e0119660.
Xue, X., Zhou, D., & Zhou, C. (2020). New insights into the existing image encryption algorithms based on DNA coding. PloS one, 15(10), e0241184.
Zhang, M., Zhang, S., & Harn, L. (2019). An efficient and adaptive data-hiding scheme based on secure random matrix. PloS one, 14(10), e0222892.
Abu-Faraj, M. a., Al-Hyari, A., & Alqadi, Z. (2022). A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography. Symmetry, 14(4), 664.
Abu-Faraj, M. a. M., & Alqadi, Z. A. (2021a). Improving the Efficiency and Scalability of Standard Methods for Data Cryptography. International Journal of Computer Science & Network Security, 21(12spc), 451-458.
Abu-Faraj, M. a. M., & Alqadi, Z. A. (2021b). Rounds Reduction and Blocks Controlling to Enhance the Performance of Standard Method of Data Cryptography. International Journal of Computer Science & Network Security, 21(12spc), 648-656.
Al-Hyari, A., Al-Taharwa, I., Al-Ahmad, B., & Alqadi, Z. (2022). CASDC: A Cryptographically Secure Data System Based on Two Private Key Images. IEEE Access, 10, 126304-126314.
Al-Hyari, A., Aldebei, K., Alqadi, Z. A., & Al-Ahmad, B. (2022). Rotation left digits to enhance the security level of message blocks cryptography. IEEE Access, 10, 69388-69397.
Biryukov, A., & De Cannière, C. (2011). Data encryption standard (DES). Encyclopedia of Cryptography and Security, 295-301.
Elmanfaloty, R. A., & Abou-Bakr, E. (2020). An image encryption scheme using a 1D chaotic double section skew tent map. Complexity, 2020.
Fang, D., & Sun, S. (2020). A new secure image encryption algorithm based on a 5D hyperchaotic map. PloS one, 15(11), e0242110.
Furht, B. (2008). Encyclopedia of multimedia: Springer Science & Business Media.
Idbeaa, T., Abdul Samad, S., & Husain, H. (2016). A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme. PloS one, 11(3), e0150732.
Kang, D., Jung, J., Lee, D., Kim, H., & Won, D. (2017). Security analysis and enhanced user authentication in proxy mobile IPv6 networks. PloS one, 12(7), e0181031.
Karule, K. P., & Nagrale, N. V. (2016). Comparative analysis of encryption algorithms for various types of data files for data security. International Journal of Scientific Engineering and Applied Science, 2(2), 495-498.
Khan, M., Masood, F., Alghafis, A., Amin, M., & Batool Naqvi, S. I. (2019). A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PloS one, 14(12), e0225031.
Khan, M., & Waseem, H. M. (2018). A novel image encryption scheme based on quantum dynamical spinning and rotations. PloS one, 13(11), e0206460.
Kharel, R., Busawon, K., & Ghassemlooy, Z. (2011). Modified chaotic shift keying using indirect coupled chaotic synchronization for secure digital communication Chaos Theory: Modeling, Simulation and Applications (pp. 207-214): World Scientific.
Mua'ad, M., & Zubi, M. (2020). Analysis and implementation of kidney stones detection by applying segmentation techniques on computerized tomography scans. Italian Journal and Applied Mathematics(43-2020), 590-602.
Mua’ad, M., Aldebei, K., & Alqadi, Z. A. (2022). Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography. Traitement du Signal, 39(1), 173-178.
Pavithra, S., & Ramadevi, E. (2012). Study and performance analysis of cryptography algorithms. International Journal of Advanced Research in Computer Engineering & Technology, 1(5), 82-86.
Rachh, R. R., Mohan, P., & Anami, B. S. (2012). Efficient implementations for AES encryption and decryption. Circuits, Systems, and Signal Processing, 31(5), 1765-1785.
Sohal, M., & Sharma, S. (2022). BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. Journal of King Saud University-Computer and Information Sciences, 34(1), 1417-1425.
Thiyagarajan, B., & Kamalakannan, R. (2014). Data integrity and security in cloud environment using AES algorithm. Paper presented at the International Conference on Information Communication and Embedded Systems (ICICES2014).
Usama, M., & Zakaria, N. (2017). Chaos-based simultaneous compression and encryption for Hadoop. PloS one, 12(1), e0168207.
Vijayalakshmi, C., Lavanya, L., & Navya, C. (2016). A Hybrid Encryption Algorithm Based On AES and RSA. International Journal of Innovative Research in Computer and Communication Engineering, 4(1), 909-917.
Wang, C., Li, Y., Xia, X., & Zheng, K. (2014). An efficient and provable secure revocable identity-based encryption scheme. PloS one, 9(9), e106925.
Wang, J., & Kissel, Z. A. (2015). Introduction to network security: theory and practice: John Wiley & Sons.
Wu, X., Li, Y., & Kurths, J. (2015). A new color image encryption scheme using CML and a fractional-order chaotic system. PloS one, 10(3), e0119660.
Xue, X., Zhou, D., & Zhou, C. (2020). New insights into the existing image encryption algorithms based on DNA coding. PloS one, 15(10), e0241184.
Zhang, M., Zhang, S., & Harn, L. (2019). An efficient and adaptive data-hiding scheme based on secure random matrix. PloS one, 14(10), e0222892.