253
Views
3
CrossRef citations to date
0
Altmetric
Research Articles

Enhancing Multimedia Security Using Shortest Weight First Algorithm and Symmetric Cryptography

, & ORCID Icon

References

  • Abduljaleel, I. Q., Abdul-Ghani, S. A., & Naji, H. Z. (2021). An image of encryption algorithm using graph theory and speech signal key generation. Journal of Physics: Conference Series, 1804(1), 012005. https://doi.org/10.1088/1742-6596/1804/1/012005
  • Ahmad, M., & Shamsher Alam, M. (2009). A new algorithm of encryption and decryption of images using chaotic mapping. International Journal on Computer Science and Engineering, 2(1), 46–50. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.208.6906&rep=rep1&type=pdf
  • Ak, M., Hanoymak, T., & Selçuk, A. A. (2014). IND-CCA secure encryption based on a Zheng–Seberry scheme. Journal of Computational and Applied Mathematics, 259(2014), 529–535. https://doi.org/10.1016/j.cam.2013.06.042
  • Anandakumar, S. (2015). Image cryptography using RSA algorithm in network security. International Journal of Computer Science & Engineering Technology, 5(9), 326–330. https://www.ijcset.net/vol5issue9.php
  • Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749–761. https://doi.org/10.1016/j.chaos.2003.12.022
  • Dey, D., & Paul, S. (2019). Color image encryption using single layer artificial neural network and buffer shuffling. International Journal of Computer Sciences and Engineering, 7(3), 202–211. https://doi.org/10.26438/ijcse/v7i3.202211
  • Gao, D., Chen, H., & Chang, C.-C. (2020). Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption. International Journal of Computational Science and Engineering, 22(2/3), 270–279. https://doi.org/10.1504/IJCSE.2020.107349
  • Gopalan, N. P., & Kumaresan, G. (2020). An effective reversible data-hiding in encrypted images using memory cellular automata. Journal of Applied Security Research, 15(1), 96–115. https://doi.org/10.1080/19361610.2019.1672456
  • Hsieh, M.-Y., Lin, H.-Y., Lai, C.-F., & Li, K.-C. (2011). Secure protocols for data propagation and group communication in vehicular networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), 1. https://doi.org/10.1186/1687-1499-2011-167
  • Hu, W.-T., Li, M.-C., Guo, C., & Yuan, L.-F. (2015). A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction. Mathematical Problems in Engineering, 2015, 849768. https://www.researchgate.net/publication/276090887_A_Reversible_Steganography_Scheme_of_Secret_Image_Sharing_Based_on_Cellular_Automata_and_Least_Significant_Bits_Construction
  • Jeppiaar, M. R. (2015). A prediction based reversible image steganographic algorithm for JPEG images. Journal of Applied Security Research, 10(3), 362–374. https://doi.org/10.1080/19361610.2015.1038766
  • Jeyaprakash, H., Kartheeban, K., Sahu, A. K., & Chokkalingam, B. (2022). Data hiding using PVD and improving security using RSA. Journal of Applied Security Research, 17(3), 413–420. https://doi.org/10.1080/19361610.2021.1900692
  • Joseph, L., Renjit, J. A., & Kumar, P. M. (2013). Dynamic programming based encrypted reversible data hiding in images. Journal of Applied Security Research, 8(4), 467–476. https://doi.org/10.1080/19361610.2013.825753
  • Kamal, S. T., Hosny, K. M., Elgindy, T. M., Darwish, M. M., & Fouda, M. M. (2021). A new image encryption algorithm for grey and color medical images. IEEE Access. 9(2021), 37855–37865. https://doi.org/10.1109/ACCESS.2021.3063237
  • Man, Z., Li, J., Di, X., Sheng, Y., & Liu, Z. (2021). Double image encryption algorithm based on neural network and chaos. Chaos, Solitons & Fractals, 152(2021), 111318. https://doi.org/10.1016/j.chaos.2021.111318
  • Mehta, D., Jha, M., Suhagiya, H., & Mangrulkar, R. (2022). DieRoll: A unique key generation and encryption technique (pp. 1–28). Journal of Applied Security Research. https://doi.org/10.1080/19361610.2022.2124589
  • Mhatre, M., Kashid, H., Jain, T., & Chavan, P. (2022). BCPIS: Blockchain-based Counterfeit Product Identification System (pp. 1–21). Journal of Applied Security Research. https://doi.org/10.1080/19361610.2022.2086784
  • Mittenthal, L. (2007). Sequencings and directed graphs with applications to cryptography. In Sequences, subsequences, and consequences (pp. 70–81). Springer. https://doi.org/10.1007/978-3-540-77404-4_7
  • Najjar, A., & Saleh, A. L. (2017). Implementation color-images cryptography using RSA algorithm. https://www.researchgate.net/publication/321906037_Implementation_Color-Images_Cryptography_Using_RSA_Algorithm
  • Nandy, N., Banerjee, D., & Pradhan, C. (2021). Color image encryption using DNA based cryptography. International Journal of Information Technology, 13(2), 533–540. https://doi.org/10.1007/s41870-018-0100-9
  • Omotosho, A., & Emuoyibofarhe, J. (2015). Private key management scheme using image features. Journal of Applied Security Research, 10(4), 543–557. https://doi.org/10.1080/19361610.2015.1069642
  • Patanwadia, R., & Mangrulkar, R. (2021). Divide and scramble - a recursive image scrambling algorithm utilizing Rubik’s cube. In 2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT), IEEE (pp. 859–863). https://doi.org/10.1109/RTEICT52294.2021.9573949
  • Pourasad, Y., Ranjbarzadeh, R., & Mardani, A. (2021). A new algorithm for digital image encryption based on chaos theory. Entropy, 23(3), 341. https://doi.org/10.3390/e23030341
  • Pramanik, S., Ghonge, M. M., Mangrulkar, R., & Le, D. N. (Eds.). (2022). Cyber security and digital forensics: Challenges and future trends. John Wiley & Sons. https://www.wiley.com/en-us/Cyber+Security+and+Digital+Forensics/%3A+Challenges+and+Future+Trends-p-9781119795643
  • Sakthidasan, K., & Santhosh Krishna, B. V. (2011). A new chaotic algorithm for image encryption and decryption of digital color images. International Journal of Information and Education Technology 1(2), 137. http://www.ijiet.org/index.php?m=content&c=index&a=show&catid=23&id=198
  • Siahaan, A. P. U. (2017). RC4 technique in visual cryptography RGB image encryption. https://www.researchgate.net/publication/305268410_RC4_Technique_in_Visual_Cryptography_RGB_Image_Encryption
  • Storms, J. E. (2016). An evaluation of the history, demand, and current methods for digital steganography [PhD dissertation]. Utica College. https://www.proquest.com/openview/8a1fc9d235c06c435f16df2a1bf25274/1?pq-origsite=gscholar&cbl=18750&diss=y
  • Tahat, N., & Abdallah, E. (2018). Hybrid publicly verifiable authenticated encryption scheme based on chaotic maps and factoring problems. Journal of Applied Security Research, 13(3), 304–314. https://doi.org/10.1080/19361610.2018.1463135

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.