Analytical Study of Hybrid Techniques for Image Encryption and Decryption
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis...
Gespeichert in:
| Veröffentlicht in: | Sensors (Basel, Switzerland) Jg. 20; H. 18; S. 5162 |
|---|---|
| Hauptverfasser: | , , , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Switzerland
MDPI
10.09.2020
MDPI AG |
| Schlagworte: | |
| ISSN: | 1424-8220, 1424-8220 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption. |
|---|---|
| AbstractList | The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption. The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption. |
| Author | Chowdhary, Chiranji Lal Attique, Muhammad Ijaz, Muhammad Fazal Patel, Pushpam Virenbhai Kathrotia, Krupal Jaysukhbhai Perumal, Kumaresan |
| AuthorAffiliation | 2 School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu 632014, India; pushpam.patel2017@vitstudent.ac.in (P.V.P.); krupal.kathrotia2017@vitstudent.ac.in (K.J.K.) 1 School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu 632014, India; chiranji.lal@vit.ac.in (C.L.C.); pkumaresan@vit.ac.in (K.P.) 3 Department of Software, Sejong University, Seoul 05006, Korea; attique@sejong.ac.kr 4 Department of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea |
| AuthorAffiliation_xml | – name: 2 School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu 632014, India; pushpam.patel2017@vitstudent.ac.in (P.V.P.); krupal.kathrotia2017@vitstudent.ac.in (K.J.K.) – name: 1 School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu 632014, India; chiranji.lal@vit.ac.in (C.L.C.); pkumaresan@vit.ac.in (K.P.) – name: 4 Department of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea – name: 3 Department of Software, Sejong University, Seoul 05006, Korea; attique@sejong.ac.kr |
| Author_xml | – sequence: 1 givenname: Chiranji Lal orcidid: 0000-0002-5476-1468 surname: Chowdhary fullname: Chowdhary, Chiranji Lal – sequence: 2 givenname: Pushpam Virenbhai surname: Patel fullname: Patel, Pushpam Virenbhai – sequence: 3 givenname: Krupal Jaysukhbhai surname: Kathrotia fullname: Kathrotia, Krupal Jaysukhbhai – sequence: 4 givenname: Muhammad orcidid: 0000-0002-7237-180X surname: Attique fullname: Attique, Muhammad – sequence: 5 givenname: Kumaresan orcidid: 0000-0001-5563-8325 surname: Perumal fullname: Perumal, Kumaresan – sequence: 6 givenname: Muhammad Fazal orcidid: 0000-0001-5206-272X surname: Ijaz fullname: Ijaz, Muhammad Fazal |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/32927714$$D View this record in MEDLINE/PubMed |
| BookMark | eNptkUtvEzEURi1URB-w4A8gL2ER6ueMvUGqSqGRKrGgrK3rV-pqYgd7Umn-PRPSRi1iZfv6-Fzb3yk6yiUHhN5T8plzTc4bI1RJ2rFX6IQKJhaKMXL0bH6MTlu7J4RxztUbdMyZZn1PxQlaXmQYpjE5GPDPcesnXCK-nmxNHt8Gd5fT721oOJaKl2tYBXyVXZ02YyoZQ_b4a3havkWvIwwtvHscz9Cvb1e3l9eLmx_fl5cXNwsnBB0X3FOvgFJmBUDoqO-dCl5CJ3orKPOdV0x74rWWPLq-917GqKJmWrqOeM7P0HLv9QXuzaamNdTJFEjmb6HUlYE6P2gIJlDlArVSShdE0BachGhJR6yVzjI5u77sXZutXQfvQh4rDC-kL3dyujOr8mB62ZOO6Vnw8VFQy-6jRrNOzYVhgBzKthkmBFOCM6Vm9MPzXocmT1nMwKc94GpprYZ4QCgxu5zNIeeZPf-HdWmEXQzzNdPwnxN_AO0uqmY |
| CitedBy_id | crossref_primary_10_1007_s11042_022_14127_w crossref_primary_10_1186_s13638_021_01985_5 crossref_primary_10_1007_s11042_023_16223_x crossref_primary_10_1007_s12083_024_01733_8 crossref_primary_10_1109_ACCESS_2020_3042475 crossref_primary_10_3390_s21051794 crossref_primary_10_4018_IJGHPC_301586 crossref_primary_10_1007_s11042_022_13782_3 crossref_primary_10_3389_fcomp_2025_1584114 crossref_primary_10_1007_s13198_025_02954_7 crossref_primary_10_1007_s11042_022_12742_1 crossref_primary_10_1007_s11042_023_15266_4 crossref_primary_10_1007_s10668_022_02395_3 crossref_primary_10_32604_cmc_2024_051608 crossref_primary_10_1007_s11042_023_15558_9 crossref_primary_10_3390_app13127168 crossref_primary_10_1007_s11042_022_12092_y crossref_primary_10_1080_19361610_2022_2150498 crossref_primary_10_1007_s11042_021_11793_0 crossref_primary_10_1007_s11042_022_12419_9 crossref_primary_10_1109_ACCESS_2020_3037329 crossref_primary_10_1007_s11042_022_13146_x crossref_primary_10_14500_aro_12153 crossref_primary_10_1007_s11042_022_12203_9 crossref_primary_10_1002_int_22564 crossref_primary_10_1002_int_22566 crossref_primary_10_3390_app11156752 crossref_primary_10_1007_s11042_022_11946_9 crossref_primary_10_1007_s11276_021_02626_x crossref_primary_10_1007_s11042_022_12326_z crossref_primary_10_1109_TGCN_2021_3067555 crossref_primary_10_1109_ACCESS_2024_3439191 crossref_primary_10_1007_s11042_022_13133_2 crossref_primary_10_32604_cmc_2022_021299 crossref_primary_10_1016_j_engappai_2024_107894 crossref_primary_10_1364_OE_560406 crossref_primary_10_1016_j_eswa_2023_121247 crossref_primary_10_1155_2022_3854635 crossref_primary_10_1007_s11042_022_14248_2 crossref_primary_10_3390_s21144714 crossref_primary_10_3233_JIFS_220767 crossref_primary_10_1108_JEDT_02_2022_0098 crossref_primary_10_1109_ACCESS_2021_3118377 crossref_primary_10_1007_s11042_022_14084_4 crossref_primary_10_1117_1_JEI_31_3_033046 crossref_primary_10_1111_exsy_13756 crossref_primary_10_1007_s13721_021_00342_2 crossref_primary_10_1155_2021_6625579 crossref_primary_10_1007_s11042_022_13867_z crossref_primary_10_1007_s11042_023_17755_y crossref_primary_10_1520_JTE20210752 crossref_primary_10_32604_cmc_2024_050337 crossref_primary_10_1007_s11227_021_03878_2 crossref_primary_10_3389_fpubh_2021_729795 crossref_primary_10_1016_j_compeleceng_2021_107633 crossref_primary_10_3390_s21113620 crossref_primary_10_1007_s11042_022_14106_1 crossref_primary_10_1007_s11042_023_14947_4 crossref_primary_10_1080_09540091_2024_2379275 crossref_primary_10_1155_2021_2485934 crossref_primary_10_1007_s41870_025_02689_5 crossref_primary_10_1109_ACCESS_2021_3108803 crossref_primary_10_1007_s11042_022_12647_z crossref_primary_10_1109_ACCESS_2023_3242616 crossref_primary_10_3390_s22166243 crossref_primary_10_1007_s11227_021_03881_7 crossref_primary_10_1155_2021_5554444 crossref_primary_10_1002_spy2_70077 crossref_primary_10_3390_s21031009 crossref_primary_10_1007_s11042_022_13752_9 crossref_primary_10_1109_TEVC_2022_3227440 crossref_primary_10_1007_s11042_023_14510_1 crossref_primary_10_1016_j_bspc_2024_107174 crossref_primary_10_1007_s11042_022_14260_6 crossref_primary_10_1007_s11042_022_13544_1 crossref_primary_10_1111_exsy_12753 crossref_primary_10_3390_s21113579 crossref_primary_10_3390_cryst11111320 crossref_primary_10_1007_s11042_022_13427_5 crossref_primary_10_1007_s11042_022_13910_z crossref_primary_10_1007_s00779_021_01546_z crossref_primary_10_1080_03772063_2025_2505105 crossref_primary_10_1088_1674_1056_ad20d9 |
| Cites_doi | 10.1007/978-981-13-8406-6_61 10.3390/s20143903 10.3390/sym11020293 10.1109/CSCloud/EdgeCom.2019.00022 10.1007/s11831-018-9298-8 10.1016/j.imu.2020.100396 10.1016/j.cnsns.2014.06.032 10.3390/e21030319 10.1088/1742-6596/978/1/012068 10.3390/e22060640 10.1007/978-3-030-42044-4 10.1007/978-981-15-2369-4_35 10.1504/IJIPT.2020.105046 10.2174/2213275911666180821092033 10.1016/j.ins.2018.12.048 10.1007/s11042-018-6579-z 10.1016/j.future.2020.01.023 10.3390/su12104124 10.1109/ETNCC.2015.7184827 10.1016/j.sigpro.2011.10.020 10.1016/j.optlaseng.2016.07.010 10.1016/j.neucom.2015.04.101 10.1016/j.chb.2020.106411 10.1007/s11227-019-02878-7 10.1007/978-3-030-44038-1_74 10.1016/j.comcom.2020.05.048 |
| ContentType | Journal Article |
| Copyright | 2020 by the authors. 2020 |
| Copyright_xml | – notice: 2020 by the authors. 2020 |
| DBID | AAYXX CITATION NPM 7X8 5PM DOA |
| DOI | 10.3390/s20185162 |
| DatabaseName | CrossRef PubMed MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed MEDLINE - Academic |
| DatabaseTitleList | MEDLINE - Academic PubMed CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: 7X8 name: MEDLINE - Academic url: https://search.proquest.com/medline sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1424-8220 |
| ExternalDocumentID | oai_doaj_org_article_e18ce1b555ce4e9bac5afb060bb5cb25 PMC7570629 32927714 10_3390_s20185162 |
| Genre | Journal Article |
| GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFFHD AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PJZUB PPXIY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M ALIPV NPM 7X8 PUEGO 5PM |
| ID | FETCH-LOGICAL-c441t-3d1d8a112b4aae61d7c8ed5a647b412d6d829d0d9953fc77dd5ff8f9295c60d33 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 90 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000581748400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1424-8220 |
| IngestDate | Tue Oct 14 19:07:52 EDT 2025 Tue Nov 04 02:02:21 EST 2025 Wed Oct 01 14:22:05 EDT 2025 Mon Jul 21 05:39:09 EDT 2025 Tue Nov 18 22:14:48 EST 2025 Sat Nov 29 07:10:41 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 18 |
| Keywords | encryption and decryption Number of Pixels Change Rate (NPCR) double playfair cipher hill cipher advanced encryption standard lossy compression peak signal to noise ratio Unified Average Changing Intensity (UACI) cryptography algorithm elliptic curve cryptography |
| Language | English |
| License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c441t-3d1d8a112b4aae61d7c8ed5a647b412d6d829d0d9953fc77dd5ff8f9295c60d33 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| ORCID | 0000-0002-7237-180X 0000-0001-5563-8325 0000-0002-5476-1468 0000-0001-5206-272X |
| OpenAccessLink | https://doaj.org/article/e18ce1b555ce4e9bac5afb060bb5cb25 |
| PMID | 32927714 |
| PQID | 2442843288 |
| PQPubID | 23479 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_e18ce1b555ce4e9bac5afb060bb5cb25 pubmedcentral_primary_oai_pubmedcentral_nih_gov_7570629 proquest_miscellaneous_2442843288 pubmed_primary_32927714 crossref_primary_10_3390_s20185162 crossref_citationtrail_10_3390_s20185162 |
| PublicationCentury | 2000 |
| PublicationDate | 20200910 |
| PublicationDateYYYYMMDD | 2020-09-10 |
| PublicationDate_xml | – month: 9 year: 2020 text: 20200910 day: 10 |
| PublicationDecade | 2020 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland |
| PublicationTitle | Sensors (Basel, Switzerland) |
| PublicationTitleAlternate | Sensors (Basel) |
| PublicationYear | 2020 |
| Publisher | MDPI MDPI AG |
| Publisher_xml | – name: MDPI – name: MDPI AG |
| References | Anwar (ref_30) 2019; 7 Dawahdeh (ref_29) 2018; 30 Liu (ref_18) 2020; 106 Arab (ref_27) 2019; 75 Hua (ref_35) 2019; 480 Mortajez (ref_20) 2020; 20 Kaur (ref_14) 2020; 27 Farah (ref_2) 2019; 99 ref_12 ref_11 ref_32 Maddikunta (ref_15) 2020; 12 Li (ref_10) 2012; 92 Park (ref_1) 2020; 11 Chen (ref_34) 2015; 20 ref_19 Belazi (ref_33) 2017; 88 Han (ref_16) 2020; 13 Srinivasan (ref_31) 2015; 8 RM (ref_13) 2020; 160 Hamad (ref_26) 2013; 3 Roy (ref_8) 2014; 3 Saied (ref_7) 2016; 172 Visu (ref_28) 2020; 79 ref_25 ref_24 ref_23 ref_22 ref_21 Mohamed (ref_5) 2020; 19 ref_3 ref_9 Chowdhary (ref_17) 2019; 12 ref_4 ref_6 |
| References_xml | – ident: ref_12 doi: 10.1007/978-981-13-8406-6_61 – volume: 3 start-page: 6711 year: 2014 ident: ref_8 article-title: Point Generation and Base Point Selection in ECC: An Overview publication-title: Int. J. Adv. Res. Comput. Commun. Eng. – ident: ref_24 doi: 10.3390/s20143903 – ident: ref_9 doi: 10.3390/sym11020293 – ident: ref_11 doi: 10.1109/CSCloud/EdgeCom.2019.00022 – volume: 27 start-page: 15 year: 2020 ident: ref_14 article-title: A comprehensive review on image encryption techniques publication-title: Arch. Comput. Methods Eng. doi: 10.1007/s11831-018-9298-8 – volume: 20 start-page: 100396 year: 2020 ident: ref_20 article-title: A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images publication-title: Inform. Med. Unlocked doi: 10.1016/j.imu.2020.100396 – volume: 20 start-page: 846 year: 2015 ident: ref_34 article-title: A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism publication-title: Commun. Nonlinear Sci. Numer. Simul. doi: 10.1016/j.cnsns.2014.06.032 – volume: 8 start-page: 1 year: 2015 ident: ref_31 article-title: Image Security using ECC Approach publication-title: Indian J. Sci. Technol. – ident: ref_32 doi: 10.3390/e21030319 – ident: ref_25 doi: 10.1088/1742-6596/978/1/012068 – volume: 30 start-page: 349 year: 2018 ident: ref_29 article-title: A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher publication-title: J. King Saud Univ. Comput. Inf. Sci. – ident: ref_22 doi: 10.3390/e22060640 – ident: ref_4 doi: 10.1007/978-3-030-42044-4 – ident: ref_19 doi: 10.1007/978-981-15-2369-4_35 – volume: 13 start-page: 1 year: 2020 ident: ref_16 article-title: Video encryption scheme using hybrid encryption technology publication-title: Int. J. Internet Protoc. Technol. doi: 10.1504/IJIPT.2020.105046 – ident: ref_23 – volume: 7 start-page: 96 year: 2019 ident: ref_30 article-title: Comparative Study of Cryptography Algorithms and Its’ Applications publication-title: Int. J. Comput. Netw. Commun. Secur. – volume: 12 start-page: 18 year: 2019 ident: ref_17 article-title: 3D object recognition system based on local shape descriptors and depth data analysis publication-title: Recent Patents Comput. Sci. doi: 10.2174/2213275911666180821092033 – volume: 99 start-page: 1 year: 2019 ident: ref_2 article-title: An image encryption scheme based on a new hybrid chaotic map and optimized substitution box publication-title: Nonlinear Dyn. – volume: 480 start-page: 403 year: 2019 ident: ref_35 article-title: Cosine-transform-based chaotic system for image encryption publication-title: Inf. Sci. doi: 10.1016/j.ins.2018.12.048 – ident: ref_6 – volume: 79 start-page: 5355 year: 2020 ident: ref_28 article-title: Removing leaf petioles and auto locating apex-base points using straight line interpolation and bisection publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-018-6579-z – volume: 106 start-page: 296 year: 2020 ident: ref_18 article-title: Information security and storage of Internet of Things based on block chains publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2020.01.023 – volume: 12 start-page: 4124 year: 2020 ident: ref_15 article-title: Location Based Business Recommendation Using Spatial Demand publication-title: Sustainability doi: 10.3390/su12104124 – ident: ref_21 doi: 10.1109/ETNCC.2015.7184827 – volume: 3 start-page: 76 year: 2013 ident: ref_26 article-title: A modified playfair cipher for encrypting digital images publication-title: Mod. Sci. – volume: 19 start-page: 279 year: 2020 ident: ref_5 article-title: Hybrid Cryptographic Approach for Internet of Hybrid Cryptographic Approach for Internet of Things Approaches: A Reveiw publication-title: J. Inf. Commun. Technol. – volume: 92 start-page: 1069 year: 2012 ident: ref_10 article-title: Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images publication-title: Signal Process. doi: 10.1016/j.sigpro.2011.10.020 – volume: 88 start-page: 37 year: 2017 ident: ref_33 article-title: Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2016.07.010 – volume: 172 start-page: 385 year: 2016 ident: ref_7 article-title: Detection of known and unknown DDoS attacks using Artificial Neural Networks publication-title: Neurocomputing doi: 10.1016/j.neucom.2015.04.101 – volume: 11 start-page: 106411 year: 2020 ident: ref_1 article-title: Does thinking-aloud affect learning, visual information processing and cognitive load when learning with seductive details as expected from self-regulation perspective? publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2020.106411 – volume: 75 start-page: 6663 year: 2019 ident: ref_27 article-title: An image encryption method based on chaos system and AES algorithm publication-title: J. Supercomput. doi: 10.1007/s11227-019-02878-7 – ident: ref_3 doi: 10.1007/978-3-030-44038-1_74 – volume: 160 start-page: 139 year: 2020 ident: ref_13 article-title: An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture publication-title: Comput. Commun. doi: 10.1016/j.comcom.2020.05.048 |
| SSID | ssj0023338 |
| Score | 2.6111557 |
| Snippet | The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the... |
| SourceID | doaj pubmedcentral proquest pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
| StartPage | 5162 |
| SubjectTerms | advanced encryption standard cryptography algorithm double playfair cipher elliptic curve cryptography encryption and decryption hill cipher |
| Title | Analytical Study of Hybrid Techniques for Image Encryption and Decryption |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/32927714 https://www.proquest.com/docview/2442843288 https://pubmed.ncbi.nlm.nih.gov/PMC7570629 https://doaj.org/article/e18ce1b555ce4e9bac5afb060bb5cb25 |
| Volume | 20 |
| WOSCitedRecordID | wos000581748400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M~E dateStart: 20010101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 7X7 dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: BENPR dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: PIMPY dateStart: 20010101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lj9MwEB7BwoE9IN6UR2UQBy7RJn7E9pGFrrYSW1VoQeUU-aldCdJV20Xqhd_O2EmrFq3EhYujOI7izCSe70vsbwDeaRc8Bv5Y6Gh9wRn6wjCRVqNVyvoYIs_C898-y8lEzWZ6upPqK80J6-SBO8MdhUq5UFkhhAs8aGucMNGWdWmtcJZm9dJS6g2Z6qkWQ-bV6QgxJPVHSwxzCC1quhd9skj_Tcjy7wmSOxHn5AHc76Ei-dB18SHcCu0jONwREHwM46wpkj9HkzQjcE3mkZyu0yoscr5RZ10SBKZk_BNHDjJq3WKdRwliWk8-hc3uE_h6Mjr_eFr0yREKhwhmVTBfeWUQLVluTKgrL50KXpiaS8sr6muvqPal11qw6KT0XsSoIqIh4erSM_YUDtp5G54DcYbjmSyqIBnHjZXImZkqDeWCOcsH8H5jtMb1yuEpgcWPBhlEsm-zte8A3m6bXnVyGTc1Ok6W3zZICte5Av3e9H5v_uX3AbzZ-K3BNyL95jBtmF8vGwQsGHMZVWoAzzo_bi_FqKZSVnhLcs_De33ZP9JeXmTVbSlkWVP94n90_iXco4m3p1QU5Ss4WC2uw2u4636tLpeLIdyWM5lLNYQ7x6PJ9MswP95Ynv0eYd10fDb9_gcXygOC |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analytical+Study+of+Hybrid+Techniques+for+Image+Encryption+and+Decryption&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Chowdhary%2C+Chiranji+Lal&rft.au=Patel%2C+Pushpam+Virenbhai&rft.au=Kathrotia%2C+Krupal+Jaysukhbhai&rft.au=Attique%2C+Muhammad&rft.date=2020-09-10&rft.eissn=1424-8220&rft.volume=20&rft.issue=18&rft_id=info:doi/10.3390%2Fs20185162&rft_id=info%3Apmid%2F32927714&rft.externalDocID=32927714 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |