164
Views
4
CrossRef citations to date
0
Altmetric
Research Articles

DieRoll: A Unique Key Generation and Encryption Technique

ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon

References

  • Ali, T., & Ali, R. 07 (2020). A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools and Applications, 79(27–28), 19853–19873. https://doi.org/10.1007/s11042-020-08850-5
  • Arpaci, B., Kurt, E., & Çelik, K. (2020). A new algorithm for the colored image encryption via the modified Chua’s circuit. Engineering Science and Technology, an International Journal, 23(3), 595–604. https://doi.org/10.1016/j.jestch.2019.09.001
  • Beloucif, A., & Noui, L. (2018). A lossless image encryption algorithm using matrix transformations and XOR operation. International Journal of Information and Communication Technology, 13(1), 99–113. https://doi.org/10.1504/IJICT.2018.090424
  • Chai, X., Chen, Y., & Broyde, L. (2017). A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in Engineering, 88, 197–213. https://doi.org/10.1016/j.optlaseng.2016.08.009
  • Chen, J., Qin, J., Xiang, X., & Tan, Y. (2020). A new encrypted image retrieval method based on feature fusion in cloud computing. International Journal of Computational Science and Engineering, 22(1), 114–123. https://doi.org/10.1504/IJCSE.2020.107261
  • Chen, Y., Lin, J., Chang, C.-C., & Hu, Y.-C. (2020). Reversibly hiding data using dual images scheme based on EMD data hiding method. International Journal of Computational Science and Engineering, 21(4), 583–592. https://doi.org/10.1504/IJCSE.2020.106872
  • Elkamchouchi, H., Salama, W. M., & Abouelseoud, Y. (2019). ArMTFr: A new permutation-based image encryption scheme. International Journal of Electronic Security and Digital Forensics, 11(1), 1–28. https://doi.org/10.1504/IJESDF.2019.096516
  • Fan, W., Li, L., Chen, X., Jiang, H., Li, Z., & Li, K.-C. (2018). Deploying parallelised ciphertext-policy attributed-based encryption in clouds. International Journal of Computational Science and Engineering, 16(3), 321–333. https://doi.org/10.1504/IJCSE.2018.091784
  • Gaur, G., Sharma, J. B., & Tharani, L. (2021). Verilog implementation of biometric-based transmission of fused images using data encryption standards algorithm. In Nanoelectronics, circuits and communication systems (pp. 455–467). Springer.
  • Hu, F., Pu, C., Gao, H., Tang, M., & Li, L. (2016). An image compression and encryption scheme based on deep learning. CoRR, abs/1608.05001.
  • Hu, F., Wang, J., Xu, X., Pu, C., & Peng, T. (2017). Batch image encryption using generated deep features based on stacked autoencoder network. Mathematical Problems in Engineering, 2017, 1–12. https://doi.org/10.1155/2017/3675459
  • Kamil, S., Ayob, M., Sheikh Abdullah, S. N. H., & Ahmad, Z. (2018). Optimized data hiding in complemented or non-complemented form in video steganography. In 2018 Cyber Resilience Conference (CRC) (pp. 1–4). IEEE. https://doi.org/10.1109/CR.2018.8626871
  • Karim Abdmouleh, M., Khalfallah, A., & Bouhlel, M. S. (2017). A novel selective encryption dwt-based algorithm for medical images. In 2017 14th International Conference on Computer Graphics, Imaging and Visualization (pp. 79–84). IEEE.
  • Kaur, G., Agarwal, R., & Patidar, V. (2020). Chaos based multiple order optical transform for 2D image encryption. Engineering Science and Technology, an International Journal, 23(5), 998–1014. https://doi.org/10.1016/j.jestch.2020.02.007
  • Lin, S. (2012). Image transmission and cryptography on the basis of mobius transform. In 2012 5th International Congress on Image and Signal Processing (pp. 258–261). IEEE.
  • Luo, E., Liu, Q., & Wang, G. (2016). Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Communications Letters, 20(9), 1772–1775. https://doi.org/10.1109/LCOMM.2016.2584614
  • Maniyath, S. R., & Thanikaiselvan, V. (2020). An efficient image encryption using deep neural network and chaotic map. Microprocessors and Microsystems, 77, 103134. https://doi.org/10.1016/j.micpro.2020.103134
  • Pan, H., Lei, Y., & Jian, C. (2018). Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing, 2018(1), 1–10. https://doi.org/10.1186/s13640-018-0386-3
  • Qiu, G.-H., Lee, C.-F., & Chang, C.-C. (2020). Greedy algorithm for image quality optimisation based on turtle-shell steganography. International Journal of Computational Science and Engineering, 23(1), 50–62. https://doi.org/10.1504/IJCSE.2020.110192
  • Qiuqiong, C., Yao, D., & Zhiyong, N. (2020). An image encryption algorithm based on combination of chaos and DNA encoding. In 2020 International Conference on Computer Vision, Image and Deep Learning (CVIDL) (pp. 182–185). IEEE. https://doi.org/10.1109/CVIDL51233.2020.00043
  • Roy, M., Chakraborty, S., & Mali, K. 06 (2021). The MSK: a simple and robust image encryption method. Multimedia Tools and Applications, 80(14), 21261–21291. https://doi.org/10.1007/s11042-021-10761-y
  • Sasikaladevi, N., Mahalakshmi, N., & Archana, N. (2018). Leach-genus 2 hyper elliptic curve based secured light-weight visual cryptography for highly sensitive images. In International Conference on Advances in Computing and Data Sciences (pp. 302–311). Springer.
  • Shannon, C. E. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28(4), 656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
  • Singh Yadav, S., & Singh, Y. (2018). Image encryption based on random scrambling and chaotic logistic map. International Journal of Grid and Utility Computing, 9(3), 228–234. https://doi.org/10.1504/IJGUC.2018.093979
  • Tabeidi, R. A., Morse, H. F., Masaad, S. M., Al-shammari, R. H., & Alsaffar, D. M. (2020). Create a hybrid algorithm by combining hill and advanced encryption standard algorithms to enhance efficiency of RGB image encryption. In International Conference on Soft Computing and Pattern Recognition (pp. 749–757). Springer.
  • Tripathy, A. K., Das, T. K., & Navaneethan, C. (2019). Data cryptography based on musical notes on a fingerboard along with a dice. Indonesian Journal of Electrical Engineering and Computer Science, 14(3), 1286–1290. https://doi.org/10.11591/ijeecs.v14.i3.pp1286-1290
  • Upadhyay, S., Dave, D., & Sharma, G. (2016). Image encryption by using block-based symmetric transformation algorithm (international data encryption algorithm). In Proceedings of International Conference on ICT for Sustainable Development (pp. 531–539). Springer.
  • Wadi, S. M., & Zainal, N. (2014). High definition image encryption algorithm based on AES modification. Wireless Personal Communications, 79(2), 811–829. https://doi.org/10.1007/s11277-014-1888-7
  • Wei, F., Ma, J., Ma, C., & Li, X. (2015). A two-factor authenticated key exchange protocol based on RSA with dynamic passwords. International Journal of Embedded Systems, 7(3/4), 257–265. https://doi.org/10.1504/IJES.2015.072366
  • Wen, W., Zhang, Y., Fang, Y., & Fang, Z. (2016). A novel selective image encryption method based on saliency detection. In 2016 Visual Communications and Image Processing (VCIP) (pp. 1–4). IEEE. https://doi.org/10.1109/VCIP.2016.7805456
  • Wu, Y., Noonan, J. P., & Agaian, S. (2011). NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 1(2), 31–38.
  • Xu, M., & Tian, Z. (2019). A novel image cipher based on 3D bit matrix and Latin cubes. Information Sciences, 478, 1–14. https://doi.org/10.1016/j.ins.2018.11.010
  • Yan, X., Wang, X., & Xian, Y. 03 (2021). Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimedia Tools and Applications, 80(7), 10949–10983. https://doi.org/10.1007/s11042-020-10218-8
  • Yang, H., Ning, Y., & Wang, Y. (2019). Research on RSA and hill hybrid encryption algorithm. International Journal of Computational Science and Engineering, 20(1), 1–6. https://doi.org/10.1504/IJCSE.2019.103241
  • Zhang, Y., Li, X., & Hou, W. (2017). A fast image encryption scheme based on AES. In 2017 2nd International Conference on Image, Vision and Computing (ICIVC) (pp. 624–628). IEEE. https://doi.org/10.1109/ICIVC.2017.7984631
  • Zhao, J.-F., Wang, S.-Y., Zhang, L.-T., & Li, X.-F. (2020). Image encryption scheme based on a novel fractional order compound chaotic attractor. International Journal of Information and Computer Security, 13(2), 166–186. https://doi.org/10.1504/IJICS.2020.108847
  • Zhao, N., Zhou, Z., & Liao, L. (2019). Partial-duplicate image retrieval based on HSV colour space for coverless information hiding. International Journal of Computational Science and Engineering, 19(1), 15–24. https://doi.org/10.1504/IJCSE.2019.099675

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.