Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » International Journal of Data and Network Science » Increasing the security of transmitted text messages using chaotic key and image key cryptography

Journals

  • IJIEC (777)
  • MSL (2643)
  • DSL (690)
  • CCL (528)
  • USCM (1092)
  • ESM (421)
  • AC (562)
  • JPM (293)
  • IJDS (952)
  • JFS (101)
  • HE (32)
  • SCI (26)

IJDS Volumes

    • Volume 1 (8)
      • Issue 1 (5)
      • Issue 2 (3)
    • Volume 2 (12)
      • Issue 1 (3)
      • Issue 2 (3)
      • Issue 3 (3)
      • Issue 4 (3)
    • Volume 3 (27)
      • Issue 1 (4)
      • Issue 2 (9)
      • Issue 3 (8)
      • Issue 4 (6)
    • Volume 4 (37)
      • Issue 1 (6)
      • Issue 2 (15)
      • Issue 3 (7)
      • Issue 4 (9)
    • Volume 5 (86)
      • Issue 1 (9)
      • Issue 2 (11)
      • Issue 3 (32)
      • Issue 4 (34)
    • Volume 6 (163)
      • Issue 1 (30)
      • Issue 2 (33)
      • Issue 3 (40)
      • Issue 4 (60)
    • Volume 7 (200)
      • Issue 1 (53)
      • Issue 2 (46)
      • Issue 3 (46)
      • Issue 4 (55)
    • Volume 8 (243)
      • Issue 1 (60)
      • Issue 2 (61)
      • Issue 3 (60)
      • Issue 4 (62)
    • Volume 9 (96)
      • Issue 1 (20)
      • Issue 2 (6)
      • Issue 3 (30)
      • Issue 4 (40)
    • Volume 10 (80)
      • Issue 1 (40)
      • Issue 2 (40)

Keywords

Supply chain management(168)
Jordan(165)
Vietnam(151)
Customer satisfaction(120)
Performance(115)
Supply chain(112)
Service quality(98)
Competitive advantage(97)
Tehran Stock Exchange(94)
SMEs(89)
optimization(87)
Sustainability(86)
Artificial intelligence(85)
Financial performance(84)
Trust(83)
TOPSIS(83)
Job satisfaction(81)
Genetic Algorithm(78)
Factor analysis(78)
Social media(78)


» Show all keywords

Authors

Naser Azad(82)
Zeplin Jiwa Husada Tarigan(66)
Mohammad Reza Iravani(64)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(40)
Dmaithan Almajali(37)
Jumadil Saputra(36)
Muhammad Turki Alshurideh(35)
Ahmad Makui(33)
Barween Al Kurdi(32)
Hassan Ghodrati(31)
Basrowi Basrowi(31)
Sautma Ronni Basana(31)
Mohammad Khodaei Valahzaghard(30)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Haitham M. Alzoubi(28)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)


» Show all authors

Countries

Iran(2192)
Indonesia(1311)
Jordan(813)
India(793)
Vietnam(510)
Saudi Arabia(478)
Malaysia(444)
China(231)
United Arab Emirates(226)
Thailand(160)
United States(114)
Ukraine(110)
Turkey(110)
Egypt(106)
Peru(94)
Canada(93)
Morocco(86)
Pakistan(85)
United Kingdom(80)
Nigeria(78)


» Show all countries

International Journal of Data and Network Science

ISSN 2561-8156 (Online) - ISSN 2561-8148 (Print)
Quarterly Publication
Volume 7 Issue 2 pp. 809-820 , 2023

Increasing the security of transmitted text messages using chaotic key and image key cryptography Pages 809-820 Right click to download the paper Download PDF

Authors: Mua’ad Abu-Faraj, Abeer Al-Hyari, Ismail Altaharwa, Zaid Alqadi, Basel J. A. Ali

DOI: 10.5267/j.ijdns.2023.1.008

Keywords: Cryptography, Image key, Chaotic logistic key, Quality, Sensitivity, Security, MSE, CC, Throughput

Abstract: It is critical to safeguard confidential data, especially secret and private messages. This study introduces a novel data cryptography approach. The new approach will be capable of encrypting and decrypting any communication size. The suggested approach will use a sophisticated private key with a convoluted structure. The private key will have 5 components with a double data type to prevent guessing or hacking. The confidential data will produce two secret keys, the first of which will be taken from the image key. These keys will be vulnerable to slight changes in private key information. To maximize the approach's efficiency, the suggested method will deal with lengthy messages by splitting them into chunks. On the other hand, the chaotic logistic map model will be used to create the second key. The suggested technique will be implemented, and several sorts of analysis (sensitivity, quality, security, and speed analysis) will be undertaken to demonstrate the benefits of the proposed method. The quality metrics MSE, PSNR, and CC will be computed to validate the suggested method's quality. To illustrate the efficiency of the proposed technique, encryption and decryption times will be measured, and cryptography throughputs will be determined. Various PKs will be tried throughout the decryption process to demonstrate how sensitive the produced outputs are to changes in the private key. The suggested approach will be tested, and the results will be compared to the results of existing methods to demonstrate the improvement offered by the proposed method.

How to cite this paper
Abu-Faraj, M., Al-Hyari, A., Altaharwa, I., Alqadi, Z & Ali, B. (2023). Increasing the security of transmitted text messages using chaotic key and image key cryptography.International Journal of Data and Network Science, 7(2), 809-820.

Refrences
Abu-Faraj, Alqadi, Z., Al-Ahmad, B., Aldebei, K., & Ali, B. (2022). A Novel Approach to Extract Color Image Features Using Image Thinning. Applied Mathematics, 16(5), 665-672.
Abu-Faraj, M. a., Al-Hyari, A., & Alqadi, Z. (2022). A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography. Symmetry, 14(4), 664.
Abu-Faraj, M. a. M., & Alqadi, Z. A. (2021a). Improving the Efficiency and Scalability of Standard Methods for Data Cryptography. International Journal of Computer Science & Network Security, 21(12spc), 451-458.
Abu-Faraj, M. a. M., & Alqadi, Z. A. (2021b). Rounds Reduction and Blocks Controlling to Enhance the Performance of Standard Method of Data Cryptography. International Journal of Computer Science & Network Security, 21(12spc), 648-656.
Al-Hyari, A., Al-Taharwa, I., Al-Ahmad, B., & Alqadi, Z. (2022). CASDC: A Cryptographically Secure Data System Based on Two Private Key Images. IEEE Access, 10, 126304-126314.
Al-Hyari, A., Aldebei, K., Alqadi, Z. A., & Al-Ahmad, B. (2022). Rotation left digits to enhance the security level of message blocks cryptography. IEEE Access, 10, 69388-69397.
Biryukov, A., & De Cannière, C. (2011). Data encryption standard (DES). Encyclopedia of Cryptography and Security, 295-301.
Elmanfaloty, R. A., & Abou-Bakr, E. (2020). An image encryption scheme using a 1D chaotic double section skew tent map. Complexity, 2020.
Fang, D., & Sun, S. (2020). A new secure image encryption algorithm based on a 5D hyperchaotic map. PloS one, 15(11), e0242110.
Furht, B. (2008). Encyclopedia of multimedia: Springer Science & Business Media.
Idbeaa, T., Abdul Samad, S., & Husain, H. (2016). A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme. PloS one, 11(3), e0150732.
Kang, D., Jung, J., Lee, D., Kim, H., & Won, D. (2017). Security analysis and enhanced user authentication in proxy mobile IPv6 networks. PloS one, 12(7), e0181031.
Karule, K. P., & Nagrale, N. V. (2016). Comparative analysis of encryption algorithms for various types of data files for data security. International Journal of Scientific Engineering and Applied Science, 2(2), 495-498.
Khan, M., Masood, F., Alghafis, A., Amin, M., & Batool Naqvi, S. I. (2019). A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PloS one, 14(12), e0225031.
Khan, M., & Waseem, H. M. (2018). A novel image encryption scheme based on quantum dynamical spinning and rotations. PloS one, 13(11), e0206460.
Kharel, R., Busawon, K., & Ghassemlooy, Z. (2011). Modified chaotic shift keying using indirect coupled chaotic synchronization for secure digital communication Chaos Theory: Modeling, Simulation and Applications (pp. 207-214): World Scientific.
Mua'ad, M., & Zubi, M. (2020). Analysis and implementation of kidney stones detection by applying segmentation techniques on computerized tomography scans. Italian Journal and Applied Mathematics(43-2020), 590-602.
Mua’ad, M., Aldebei, K., & Alqadi, Z. A. (2022). Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography. Traitement du Signal, 39(1), 173-178.
Pavithra, S., & Ramadevi, E. (2012). Study and performance analysis of cryptography algorithms. International Journal of Advanced Research in Computer Engineering & Technology, 1(5), 82-86.
Rachh, R. R., Mohan, P., & Anami, B. S. (2012). Efficient implementations for AES encryption and decryption. Circuits, Systems, and Signal Processing, 31(5), 1765-1785.
Sohal, M., & Sharma, S. (2022). BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. Journal of King Saud University-Computer and Information Sciences, 34(1), 1417-1425.
Thiyagarajan, B., & Kamalakannan, R. (2014). Data integrity and security in cloud environment using AES algorithm. Paper presented at the International Conference on Information Communication and Embedded Systems (ICICES2014).
Usama, M., & Zakaria, N. (2017). Chaos-based simultaneous compression and encryption for Hadoop. PloS one, 12(1), e0168207.
Vijayalakshmi, C., Lavanya, L., & Navya, C. (2016). A Hybrid Encryption Algorithm Based On AES and RSA. International Journal of Innovative Research in Computer and Communication Engineering, 4(1), 909-917.
Wang, C., Li, Y., Xia, X., & Zheng, K. (2014). An efficient and provable secure revocable identity-based encryption scheme. PloS one, 9(9), e106925.
Wang, J., & Kissel, Z. A. (2015). Introduction to network security: theory and practice: John Wiley & Sons.
Wu, X., Li, Y., & Kurths, J. (2015). A new color image encryption scheme using CML and a fractional-order chaotic system. PloS one, 10(3), e0119660.
Xue, X., Zhou, D., & Zhou, C. (2020). New insights into the existing image encryption algorithms based on DNA coding. PloS one, 15(10), e0241184.
Zhang, M., Zhang, S., & Harn, L. (2019). An efficient and adaptive data-hiding scheme based on secure random matrix. PloS one, 14(10), e0222892.
  • 51
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: International Journal of Data and Network Science | Year: 2023 | Volume: 7 | Issue: 2 | Views: 1512 | Reviews: 0

Related Articles:
  • A novel security analysis for a new NTRU variant with additional private ke ...
  • Determining the price elasticity of demand with and without memory effects ...
  • Man-in-the-middle-attack: Understanding in simple words
  • A new method for decoding an encrypted text by genetic algorithms and its c ...
  • A new method for improving security in MANETs AODV Protocol

Add Reviews

Name:*
E-Mail:
Review:
Bold Italic Underline Strike | Align left Center Align right | Insert smilies Insert link URLInsert protected URL Select color | Add Hidden Text Insert Quote Convert selected text from selection to Cyrillic (Russian) alphabet Insert spoiler
winkwinkedsmileam
belayfeelfellowlaughing
lollovenorecourse
requestsadtonguewassat
cryingwhatbullyangry
Security Code: *
Include security image CAPCHA.
Refresh Code

® 2010-2026 GrowingScience.Com