Analytical Study of Hybrid Techniques for Image Encryption and Decryption

The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis...

Full description

Saved in:
Bibliographic Details
Published in:Sensors (Basel, Switzerland) Vol. 20; no. 18; p. 5162
Main Authors: Chowdhary, Chiranji Lal, Patel, Pushpam Virenbhai, Kathrotia, Krupal Jaysukhbhai, Attique, Muhammad, Perumal, Kumaresan, Ijaz, Muhammad Fazal
Format: Journal Article
Language:English
Published: Switzerland MDPI 10.09.2020
MDPI AG
Subjects:
ISSN:1424-8220, 1424-8220
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
AbstractList The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
Author Chowdhary, Chiranji Lal
Attique, Muhammad
Ijaz, Muhammad Fazal
Patel, Pushpam Virenbhai
Kathrotia, Krupal Jaysukhbhai
Perumal, Kumaresan
AuthorAffiliation 2 School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu 632014, India; pushpam.patel2017@vitstudent.ac.in (P.V.P.); krupal.kathrotia2017@vitstudent.ac.in (K.J.K.)
1 School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu 632014, India; chiranji.lal@vit.ac.in (C.L.C.); pkumaresan@vit.ac.in (K.P.)
3 Department of Software, Sejong University, Seoul 05006, Korea; attique@sejong.ac.kr
4 Department of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
AuthorAffiliation_xml – name: 2 School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu 632014, India; pushpam.patel2017@vitstudent.ac.in (P.V.P.); krupal.kathrotia2017@vitstudent.ac.in (K.J.K.)
– name: 1 School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu 632014, India; chiranji.lal@vit.ac.in (C.L.C.); pkumaresan@vit.ac.in (K.P.)
– name: 4 Department of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
– name: 3 Department of Software, Sejong University, Seoul 05006, Korea; attique@sejong.ac.kr
Author_xml – sequence: 1
  givenname: Chiranji Lal
  orcidid: 0000-0002-5476-1468
  surname: Chowdhary
  fullname: Chowdhary, Chiranji Lal
– sequence: 2
  givenname: Pushpam Virenbhai
  surname: Patel
  fullname: Patel, Pushpam Virenbhai
– sequence: 3
  givenname: Krupal Jaysukhbhai
  surname: Kathrotia
  fullname: Kathrotia, Krupal Jaysukhbhai
– sequence: 4
  givenname: Muhammad
  orcidid: 0000-0002-7237-180X
  surname: Attique
  fullname: Attique, Muhammad
– sequence: 5
  givenname: Kumaresan
  orcidid: 0000-0001-5563-8325
  surname: Perumal
  fullname: Perumal, Kumaresan
– sequence: 6
  givenname: Muhammad Fazal
  orcidid: 0000-0001-5206-272X
  surname: Ijaz
  fullname: Ijaz, Muhammad Fazal
BackLink https://www.ncbi.nlm.nih.gov/pubmed/32927714$$D View this record in MEDLINE/PubMed
BookMark eNptkUtvEzEURi1URB-w4A8gL2ER6ueMvUGqSqGRKrGgrK3rV-pqYgd7Umn-PRPSRi1iZfv6-Fzb3yk6yiUHhN5T8plzTc4bI1RJ2rFX6IQKJhaKMXL0bH6MTlu7J4RxztUbdMyZZn1PxQlaXmQYpjE5GPDPcesnXCK-nmxNHt8Gd5fT721oOJaKl2tYBXyVXZ02YyoZQ_b4a3havkWvIwwtvHscz9Cvb1e3l9eLmx_fl5cXNwsnBB0X3FOvgFJmBUDoqO-dCl5CJ3orKPOdV0x74rWWPLq-917GqKJmWrqOeM7P0HLv9QXuzaamNdTJFEjmb6HUlYE6P2gIJlDlArVSShdE0BachGhJR6yVzjI5u77sXZutXQfvQh4rDC-kL3dyujOr8mB62ZOO6Vnw8VFQy-6jRrNOzYVhgBzKthkmBFOCM6Vm9MPzXocmT1nMwKc94GpprYZ4QCgxu5zNIeeZPf-HdWmEXQzzNdPwnxN_AO0uqmY
CitedBy_id crossref_primary_10_1007_s11042_022_14127_w
crossref_primary_10_1186_s13638_021_01985_5
crossref_primary_10_1007_s11042_023_16223_x
crossref_primary_10_1007_s12083_024_01733_8
crossref_primary_10_1109_ACCESS_2020_3042475
crossref_primary_10_3390_s21051794
crossref_primary_10_4018_IJGHPC_301586
crossref_primary_10_1007_s11042_022_13782_3
crossref_primary_10_3389_fcomp_2025_1584114
crossref_primary_10_1007_s13198_025_02954_7
crossref_primary_10_1007_s11042_022_12742_1
crossref_primary_10_1007_s11042_023_15266_4
crossref_primary_10_1007_s10668_022_02395_3
crossref_primary_10_32604_cmc_2024_051608
crossref_primary_10_1007_s11042_023_15558_9
crossref_primary_10_3390_app13127168
crossref_primary_10_1007_s11042_022_12092_y
crossref_primary_10_1080_19361610_2022_2150498
crossref_primary_10_1007_s11042_021_11793_0
crossref_primary_10_1007_s11042_022_12419_9
crossref_primary_10_1109_ACCESS_2020_3037329
crossref_primary_10_1007_s11042_022_13146_x
crossref_primary_10_14500_aro_12153
crossref_primary_10_1007_s11042_022_12203_9
crossref_primary_10_1002_int_22564
crossref_primary_10_1002_int_22566
crossref_primary_10_3390_app11156752
crossref_primary_10_1007_s11042_022_11946_9
crossref_primary_10_1007_s11276_021_02626_x
crossref_primary_10_1007_s11042_022_12326_z
crossref_primary_10_1109_TGCN_2021_3067555
crossref_primary_10_1109_ACCESS_2024_3439191
crossref_primary_10_1007_s11042_022_13133_2
crossref_primary_10_32604_cmc_2022_021299
crossref_primary_10_1016_j_engappai_2024_107894
crossref_primary_10_1364_OE_560406
crossref_primary_10_1016_j_eswa_2023_121247
crossref_primary_10_1155_2022_3854635
crossref_primary_10_1007_s11042_022_14248_2
crossref_primary_10_3390_s21144714
crossref_primary_10_3233_JIFS_220767
crossref_primary_10_1108_JEDT_02_2022_0098
crossref_primary_10_1109_ACCESS_2021_3118377
crossref_primary_10_1007_s11042_022_14084_4
crossref_primary_10_1117_1_JEI_31_3_033046
crossref_primary_10_1111_exsy_13756
crossref_primary_10_1007_s13721_021_00342_2
crossref_primary_10_1155_2021_6625579
crossref_primary_10_1007_s11042_022_13867_z
crossref_primary_10_1007_s11042_023_17755_y
crossref_primary_10_1520_JTE20210752
crossref_primary_10_32604_cmc_2024_050337
crossref_primary_10_1007_s11227_021_03878_2
crossref_primary_10_3389_fpubh_2021_729795
crossref_primary_10_1016_j_compeleceng_2021_107633
crossref_primary_10_3390_s21113620
crossref_primary_10_1007_s11042_022_14106_1
crossref_primary_10_1007_s11042_023_14947_4
crossref_primary_10_1080_09540091_2024_2379275
crossref_primary_10_1155_2021_2485934
crossref_primary_10_1007_s41870_025_02689_5
crossref_primary_10_1109_ACCESS_2021_3108803
crossref_primary_10_1007_s11042_022_12647_z
crossref_primary_10_1109_ACCESS_2023_3242616
crossref_primary_10_3390_s22166243
crossref_primary_10_1007_s11227_021_03881_7
crossref_primary_10_1155_2021_5554444
crossref_primary_10_1002_spy2_70077
crossref_primary_10_3390_s21031009
crossref_primary_10_1007_s11042_022_13752_9
crossref_primary_10_1109_TEVC_2022_3227440
crossref_primary_10_1007_s11042_023_14510_1
crossref_primary_10_1016_j_bspc_2024_107174
crossref_primary_10_1007_s11042_022_14260_6
crossref_primary_10_1007_s11042_022_13544_1
crossref_primary_10_1111_exsy_12753
crossref_primary_10_3390_s21113579
crossref_primary_10_3390_cryst11111320
crossref_primary_10_1007_s11042_022_13427_5
crossref_primary_10_1007_s11042_022_13910_z
crossref_primary_10_1007_s00779_021_01546_z
crossref_primary_10_1080_03772063_2025_2505105
crossref_primary_10_1088_1674_1056_ad20d9
Cites_doi 10.1007/978-981-13-8406-6_61
10.3390/s20143903
10.3390/sym11020293
10.1109/CSCloud/EdgeCom.2019.00022
10.1007/s11831-018-9298-8
10.1016/j.imu.2020.100396
10.1016/j.cnsns.2014.06.032
10.3390/e21030319
10.1088/1742-6596/978/1/012068
10.3390/e22060640
10.1007/978-3-030-42044-4
10.1007/978-981-15-2369-4_35
10.1504/IJIPT.2020.105046
10.2174/2213275911666180821092033
10.1016/j.ins.2018.12.048
10.1007/s11042-018-6579-z
10.1016/j.future.2020.01.023
10.3390/su12104124
10.1109/ETNCC.2015.7184827
10.1016/j.sigpro.2011.10.020
10.1016/j.optlaseng.2016.07.010
10.1016/j.neucom.2015.04.101
10.1016/j.chb.2020.106411
10.1007/s11227-019-02878-7
10.1007/978-3-030-44038-1_74
10.1016/j.comcom.2020.05.048
ContentType Journal Article
Copyright 2020 by the authors. 2020
Copyright_xml – notice: 2020 by the authors. 2020
DBID AAYXX
CITATION
NPM
7X8
5PM
DOA
DOI 10.3390/s20185162
DatabaseName CrossRef
PubMed
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
MEDLINE - Academic
DatabaseTitleList CrossRef
PubMed

MEDLINE - Academic

Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals (DOAJ)
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: 7X8
  name: MEDLINE - Academic
  url: https://search.proquest.com/medline
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_e18ce1b555ce4e9bac5afb060bb5cb25
PMC7570629
32927714
10_3390_s20185162
Genre Journal Article
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
ALIPV
NPM
7X8
PUEGO
5PM
ID FETCH-LOGICAL-c441t-3d1d8a112b4aae61d7c8ed5a647b412d6d829d0d9953fc77dd5ff8f9295c60d33
IEDL.DBID DOA
ISICitedReferencesCount 90
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000581748400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1424-8220
IngestDate Tue Oct 14 19:07:52 EDT 2025
Tue Nov 04 02:02:21 EST 2025
Wed Oct 01 14:22:05 EDT 2025
Mon Jul 21 05:39:09 EDT 2025
Tue Nov 18 22:14:48 EST 2025
Sat Nov 29 07:10:41 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 18
Keywords encryption and decryption
Number of Pixels Change Rate (NPCR)
double playfair cipher
hill cipher
advanced encryption standard
lossy compression
peak signal to noise ratio
Unified Average Changing Intensity (UACI)
cryptography algorithm
elliptic curve cryptography
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c441t-3d1d8a112b4aae61d7c8ed5a647b412d6d829d0d9953fc77dd5ff8f9295c60d33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0002-7237-180X
0000-0001-5563-8325
0000-0002-5476-1468
0000-0001-5206-272X
OpenAccessLink https://doaj.org/article/e18ce1b555ce4e9bac5afb060bb5cb25
PMID 32927714
PQID 2442843288
PQPubID 23479
ParticipantIDs doaj_primary_oai_doaj_org_article_e18ce1b555ce4e9bac5afb060bb5cb25
pubmedcentral_primary_oai_pubmedcentral_nih_gov_7570629
proquest_miscellaneous_2442843288
pubmed_primary_32927714
crossref_primary_10_3390_s20185162
crossref_citationtrail_10_3390_s20185162
PublicationCentury 2000
PublicationDate 20200910
PublicationDateYYYYMMDD 2020-09-10
PublicationDate_xml – month: 9
  year: 2020
  text: 20200910
  day: 10
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2020
Publisher MDPI
MDPI AG
Publisher_xml – name: MDPI
– name: MDPI AG
References Anwar (ref_30) 2019; 7
Dawahdeh (ref_29) 2018; 30
Liu (ref_18) 2020; 106
Arab (ref_27) 2019; 75
Hua (ref_35) 2019; 480
Mortajez (ref_20) 2020; 20
Kaur (ref_14) 2020; 27
Farah (ref_2) 2019; 99
ref_12
ref_11
ref_32
Maddikunta (ref_15) 2020; 12
Li (ref_10) 2012; 92
Park (ref_1) 2020; 11
Chen (ref_34) 2015; 20
ref_19
Belazi (ref_33) 2017; 88
Han (ref_16) 2020; 13
Srinivasan (ref_31) 2015; 8
RM (ref_13) 2020; 160
Hamad (ref_26) 2013; 3
Roy (ref_8) 2014; 3
Saied (ref_7) 2016; 172
Visu (ref_28) 2020; 79
ref_25
ref_24
ref_23
ref_22
ref_21
Mohamed (ref_5) 2020; 19
ref_3
ref_9
Chowdhary (ref_17) 2019; 12
ref_4
ref_6
References_xml – ident: ref_12
  doi: 10.1007/978-981-13-8406-6_61
– volume: 3
  start-page: 6711
  year: 2014
  ident: ref_8
  article-title: Point Generation and Base Point Selection in ECC: An Overview
  publication-title: Int. J. Adv. Res. Comput. Commun. Eng.
– ident: ref_24
  doi: 10.3390/s20143903
– ident: ref_9
  doi: 10.3390/sym11020293
– ident: ref_11
  doi: 10.1109/CSCloud/EdgeCom.2019.00022
– volume: 27
  start-page: 15
  year: 2020
  ident: ref_14
  article-title: A comprehensive review on image encryption techniques
  publication-title: Arch. Comput. Methods Eng.
  doi: 10.1007/s11831-018-9298-8
– volume: 20
  start-page: 100396
  year: 2020
  ident: ref_20
  article-title: A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images
  publication-title: Inform. Med. Unlocked
  doi: 10.1016/j.imu.2020.100396
– volume: 20
  start-page: 846
  year: 2015
  ident: ref_34
  article-title: A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism
  publication-title: Commun. Nonlinear Sci. Numer. Simul.
  doi: 10.1016/j.cnsns.2014.06.032
– volume: 8
  start-page: 1
  year: 2015
  ident: ref_31
  article-title: Image Security using ECC Approach
  publication-title: Indian J. Sci. Technol.
– ident: ref_32
  doi: 10.3390/e21030319
– ident: ref_25
  doi: 10.1088/1742-6596/978/1/012068
– volume: 30
  start-page: 349
  year: 2018
  ident: ref_29
  article-title: A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher
  publication-title: J. King Saud Univ. Comput. Inf. Sci.
– ident: ref_22
  doi: 10.3390/e22060640
– ident: ref_4
  doi: 10.1007/978-3-030-42044-4
– ident: ref_19
  doi: 10.1007/978-981-15-2369-4_35
– volume: 13
  start-page: 1
  year: 2020
  ident: ref_16
  article-title: Video encryption scheme using hybrid encryption technology
  publication-title: Int. J. Internet Protoc. Technol.
  doi: 10.1504/IJIPT.2020.105046
– ident: ref_23
– volume: 7
  start-page: 96
  year: 2019
  ident: ref_30
  article-title: Comparative Study of Cryptography Algorithms and Its’ Applications
  publication-title: Int. J. Comput. Netw. Commun. Secur.
– volume: 12
  start-page: 18
  year: 2019
  ident: ref_17
  article-title: 3D object recognition system based on local shape descriptors and depth data analysis
  publication-title: Recent Patents Comput. Sci.
  doi: 10.2174/2213275911666180821092033
– volume: 99
  start-page: 1
  year: 2019
  ident: ref_2
  article-title: An image encryption scheme based on a new hybrid chaotic map and optimized substitution box
  publication-title: Nonlinear Dyn.
– volume: 480
  start-page: 403
  year: 2019
  ident: ref_35
  article-title: Cosine-transform-based chaotic system for image encryption
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2018.12.048
– ident: ref_6
– volume: 79
  start-page: 5355
  year: 2020
  ident: ref_28
  article-title: Removing leaf petioles and auto locating apex-base points using straight line interpolation and bisection
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-018-6579-z
– volume: 106
  start-page: 296
  year: 2020
  ident: ref_18
  article-title: Information security and storage of Internet of Things based on block chains
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2020.01.023
– volume: 12
  start-page: 4124
  year: 2020
  ident: ref_15
  article-title: Location Based Business Recommendation Using Spatial Demand
  publication-title: Sustainability
  doi: 10.3390/su12104124
– ident: ref_21
  doi: 10.1109/ETNCC.2015.7184827
– volume: 3
  start-page: 76
  year: 2013
  ident: ref_26
  article-title: A modified playfair cipher for encrypting digital images
  publication-title: Mod. Sci.
– volume: 19
  start-page: 279
  year: 2020
  ident: ref_5
  article-title: Hybrid Cryptographic Approach for Internet of Hybrid Cryptographic Approach for Internet of Things Approaches: A Reveiw
  publication-title: J. Inf. Commun. Technol.
– volume: 92
  start-page: 1069
  year: 2012
  ident: ref_10
  article-title: Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2011.10.020
– volume: 88
  start-page: 37
  year: 2017
  ident: ref_33
  article-title: Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2016.07.010
– volume: 172
  start-page: 385
  year: 2016
  ident: ref_7
  article-title: Detection of known and unknown DDoS attacks using Artificial Neural Networks
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2015.04.101
– volume: 11
  start-page: 106411
  year: 2020
  ident: ref_1
  article-title: Does thinking-aloud affect learning, visual information processing and cognitive load when learning with seductive details as expected from self-regulation perspective?
  publication-title: Comput. Hum. Behav.
  doi: 10.1016/j.chb.2020.106411
– volume: 75
  start-page: 6663
  year: 2019
  ident: ref_27
  article-title: An image encryption method based on chaos system and AES algorithm
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-019-02878-7
– ident: ref_3
  doi: 10.1007/978-3-030-44038-1_74
– volume: 160
  start-page: 139
  year: 2020
  ident: ref_13
  article-title: An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2020.05.048
SSID ssj0023338
Score 2.6111007
Snippet The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the...
SourceID doaj
pubmedcentral
proquest
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 5162
SubjectTerms advanced encryption standard
cryptography algorithm
double playfair cipher
elliptic curve cryptography
encryption and decryption
hill cipher
Title Analytical Study of Hybrid Techniques for Image Encryption and Decryption
URI https://www.ncbi.nlm.nih.gov/pubmed/32927714
https://www.proquest.com/docview/2442843288
https://pubmed.ncbi.nlm.nih.gov/PMC7570629
https://doaj.org/article/e18ce1b555ce4e9bac5afb060bb5cb25
Volume 20
WOSCitedRecordID wos000581748400001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: Directory of Open Access Journals (DOAJ)
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: PIMPY
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lj9MwEB7BwgEOiDfhURnEgUu0sR2_jix0tT1sVaFFKqfIT-1KkKK2i9QLv51xklYtWokLF0txJoo1E3u-sSffALyXVAeumC4jTqSyrhMvrUyxDFInfMBR7vpiE2o61fO5me2V-so5YT09cK-440i1j9QJIXyso3HWC5tcJSvnhHesYy-tlNkGU0OoxTHy6nmEOAb1xyt0cwgtJDvwPh1J_03I8u8EyT2Pc_oQHgxQkXzsh_gIbsX2MdzfIxB8ApOOU6TbjiY5I3BDFomcbfJfWORiy866IghMyeQHrhxk3PrlplsliG0D-Ry3l0_h6-n44tNZORRHKD0imHXJAw3aIlpytbVR0qC8jkFYWStXUxZk0MyEKhgjePJKhSBS0gnRkPCyCpw_g6N20cYXQAyj0tJ8AGsp-nNjNeNWJccsd0kZWcCHrdIaPzCH5wIW3xuMILJ-m51-C3i3E_3Z02XcJHSSNb8TyAzXXQfavRns3vzL7gW83dqtwRmRjzlsGxfXqwYBC_pczrQu4Hlvx92rODNMKVoXoA4sfDCWwzvt1WXHuq2EqiQzL__H4F_BPZbj9lyKonoNR-vldXwDd_2v9dVqOYLbaq66Vo_gzsl4Ovsy6j5vbM9_j7FvNjmfffsD9AEC_g
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analytical+Study+of+Hybrid+Techniques+for+Image+Encryption+and+Decryption&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Chowdhary%2C+Chiranji+Lal&rft.au=Patel%2C+Pushpam+Virenbhai&rft.au=Kathrotia%2C+Krupal+Jaysukhbhai&rft.au=Attique%2C+Muhammad&rft.date=2020-09-10&rft.pub=MDPI&rft.eissn=1424-8220&rft.volume=20&rft.issue=18&rft_id=info:doi/10.3390%2Fs20185162&rft_id=info%3Apmid%2F32927714&rft.externalDocID=PMC7570629
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon