550
Views
0
CrossRef citations to date
0
Altmetric
Articles

Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption

, ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Pages 280-300 | Received 06 Apr 2023, Accepted 08 Nov 2023, Published online: 26 Nov 2023

References

  • Akkasaligar, P. T., & Biradar, S. (2020). Selective medical image encryption using DNA cryptography. Information Security Journal: A Global Perspective, 29(2), 91–101.
  • Anh, L. D., Vo, B., & Pedrycz, W. (2017). Information granulation construction and representation strategies for classification in imbalanced data based on granular computing. Journal of Information and Telecommunication, 1(2), 113–126. https://doi.org/10.1080/24751839.2017.1323476
  • Bao, L., & Zhou, Y. (2015). Image encryption: Generating visually meaningful encrypted images. Information Sciences, 324, 197–207. https://doi.org/10.1016/j.ins.2015.06.049
  • Chakraborty, S., Seal, A., Roy, M., & Mali, K. (2016). A novel lossless image encryption method using DNA substitution and chaotic logistic map. International Journal of Security and Its Applications, 10(2), 205–216. https://doi.org/10.14257/ijsia
  • Cheng, Q., Hua, Y., & Stoica, P. (2000). Asymptotic performance of optimal gain-and-phase estimators of sensor arrays. IEEE Transactions on Signal Processing, 48(12), 3587–3590. https://doi.org/10.1109/78.887058
  • Dar, S. B. (2014). Enhancing the security of Caesar Cipher using double substitution method. International Journal of Computer Science & Engineering Technology, 5(7), 772–774.
  • Deshpande, K., Girkar, J., & Mangrulkar, R. (2023). Security enhancement and analysis of images using a novel Sudoku-based Encryption Algorithm. Journal of Information and Telecommunication, 7(3), 270–303. https://doi.org/10.1080/24751839.2023.2183802
  • Godara, S., Kundu, S., & Kaler, R. (2018). An improved algorithmic implementation of rail fence Cipher. International Journal of Future Generation Communication and Networking, 11(2), 23–32. https://doi.org/10.14257/ijfgcn
  • Goyal, K., & Kinger, S. (2013). Modified Caesar Cipher for better security enhancement. International Journal of Computer Applications, 73(3), 0975–8887. https://doi.org/10.5120/12722-9558
  • Hu, F., Pu, C., Gao, H., Tang, M., & Li, L. (2016). An image compression and encryption scheme based on deep learning. CoRR, abs/1608.05001.
  • Hu, F., Wang, J., Xu, X., Pu, C., & Peng, T. (2017). Batch image encryption using generated deep features based on stacked autoencoder network. Mathematical Problems in Engineering, 2017, 1–12.
  • Hua, Z., Zhou, Y., & Huang, H. (2019). Cosine-transform-based chaotic system for image encryption. Information Sciences, 480, 403–419. https://doi.org/10.1016/j.ins.2018.12.048
  • Lasry, G., Kopal, N., & Wacker, A. (2016). Cryptanalysis of columnar transposition Cipher with long keys. Cryptologia, 40(4), 374–398. https://doi.org/10.1080/01611194.2015.1087074
  • Leong, M.-P., Cheung, O. Y., Tsoi, K. H., & Leong, P. H. W. (2000). A bit-serial implementation of the international data encryption algorithm idea. In Proceedings 2000 IEEE Symposium on Field-Programmable Custom Computing Machines (Cat. No. PR00871) (pp. 122–131). IEEE.
  • Liu, X., Mei, W., & Du, H. (2014). Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain. Journal of Modern Optics, 61(19), 1570–1577. https://doi.org/10.1080/09500340.2014.946565
  • Maity, A., Ghosh, R., & Bhadra, S. (2022). Image encryption using RSA and advanced Caesar Cipher method. In 2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC) (pp. 1–5).
  • Mandal, M. K., Banik, G. D., Chattopadhyay, D., & Nandi, D. (2012). An image encryption process based on chaotic logistic map. IETE Technical Review, 29(5), 395–404. https://doi.org/10.4103/0256-4602.103173
  • Maniyath, S. R., & Thanikaiselvan, V. (2020). An efficient image encryption using deep neural network and chaotic map. Microprocessors and Microsystems, 77, Article 103134. https://doi.org/10.1016/j.micpro.2020.103134
  • Mohammad, O. F., Rahim, M. S. M., Zeebaree, S. R. M., & Ahmed, F. (2017). A survey and analysis of the image encryption methods. International Journal of Applied Engineering Research, 12(23), 13265–13280.
  • Naim, M., & Ali Pacha, A. (2021). New chaotic satellite image encryption by using some or all the rounds of the AES algorithm. Information Security Journal: A Global Perspective, 32(3), 187–211.
  • Osman, T., Psyche, S. S., Deb, T., Firoze, A., & Rahman, R. M. (2019). An algorithmic approach to estimate cognitive aesthetics of images relative to ground truth of human psychology through a large user study. Journal of Information and Telecommunication, 3(2), 156–179. https://doi.org/10.1080/24751839.2018.1542574
  • Qowi, Z., & Hudallah, N. (2021). Combining Caesar Cipher and Hill Cipher in the generating encryption key on the Vigenere Cipher Algorithm. In Journal of Physics: Conference Series (Vol. 1918, pp. 042009). IOP Publishing.
  • Rachmawati, D., Hardi, S. M., & Pasaribu, R. P. (2019). Combination of columnar transposition Cipher Caesar Cipher and lempel ziv welch algorithm in image security and compression. Journal of Physics: Conference Series, 1339(1), Article 012007.
  • Raja, S., & Suruliandi, A. (2018). Secured image compression using AES in Bandelet domain. International Journal of Computational Science and Engineering, 17(2), 208–219. https://doi.org/10.1504/IJCSE.2018.094930
  • Ritter, T. (1991). Transposition Cipher with pseudo-random shuffling: The dynamic transposition combiner. Cryptologia, 15(1), 1–17. https://doi.org/10.1080/0161-119191865731
  • Saini, B. (2015). Modified Caesar Cipher and rail fence technique to enhance security. Int J Trend Res Dev, 2(5), 348–350.
  • Sanchez-Avila, C., & Sanchez-Reillol, R. (2001). The Rijndael block Cipher (AES proposal): A comparison with des. In Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No. 01CH37186) (pp. 229–234). IEEE.
  • Seal, A., Chakraborty, S., & Mali, K. (2017). A new and resilient image encryption technique based on pixel manipulation, value transformation and visual transformation utilizing single-level haar wavelet transform. In Proceedings of the First International Conference on Intelligent Computing and Communication (pp. 603–611). Springer.
  • Shrivastava, G., Sharma, R., & Chouhan, M. (2013). Using letters frequency analysis in Caesar Cipher with double columnar transposition technique. International Journal of Engineering Sciences & Research Technology, 2(6): June, 2013.
  • Siahaan, A. P. U. (2017). Rail-fence-cryptography-in-securing-information.
  • Srikantaswamy, S., & Phaneendra, D. H. (2012). Improved Caesar Cipher with random number generation technique and multistage encryption. International Journal on Cryptography and Information Security (IJCIS), 2(4), 39–49. https://doi.org/10.5121/ijcis
  • Srivastava, M., Srivastava, U., & Srivastava, S. (2023). Modified Caesar Cipher with image steganography. In 2023 6th International Conference on Information Systems and Computer Networks (ISCON) (pp. 1–6).
  • Standard, D. E. (1977). Federal information processing standards publication 46. National Bureau of Standards, US Department of Commerce, FIPS Publication 46-3, 23, 1–18.
  • Talbert, R. (2006). The cycle structure and order of the rail fence Cipher. Cryptologia, 30(2), 159–172. https://doi.org/10.1080/01611190500380082
  • Wadi, S., & Zainal, N. (2014). High definition image encryption algorithm based on AES modification. Wireless Personal Communications, 79(2), 811–829. https://doi.org/10.1007/s11277-014-1888-7
  • Wang, X., Wang, S., Zhang, Y., & Guo, K. (2017). A novel image encryption algorithm based on chaotic shuffling method. Information Security Journal: A Global Perspective, 26(1), 7–16.
  • Yang, H., Ning, Y., & Wang, Y. (2019). Research on RSA and Hill hybrid encryption algorithm. International Journal of Computational Science and Engineering, 20(1), 1–6. https://doi.org/10.1504/IJCSE.2019.103241
  • Ye, R. (2011). A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Communications, 284(22), 5290–5298. https://doi.org/10.1016/j.optcom.2011.07.070
  • Zhang, Y. (2016). The image encryption algorithm with plaintext-related shuffling. IETE Technical Review, 33(3), 310–322. https://doi.org/10.1080/02564602.2015.1087350