{"title":"Image encryption with General Singular Values Decomposition via logistic function by encryption key only real number (method-2)","authors":"Mohammed Abdul-Hameed","doi":"10.47974/jim-1629","DOIUrl":null,"url":null,"abstract":"In this algorithm the development of a previous algorithm was a master’s thesis by researcher Maher AL-Bashkani. Where he used a technique (gsvd) with Logistic function to encrypt the image through a composite key which is two keys. The first is a real number and the second is a picture. In this algorithm we will call it (MK-11) we will dispense with the second key (picture) and with only the first key (real number). We will generate a 3D matrix that represents another key we create through the work of our algorithm. This is a new method that has not been used by previous algorithms. We know nothing about this triple matrix we create by implementing the algorithm. Therefore, this algorithm is considered very excellent and possesses high immunity against hackers who try to break the encryption. The work of this algorithm focuses on three steps: The first is to create an array with the same dimensions as the image we want to encode depending on the numerical components of the image matrix as we will see later. The second step is the first distraction of the image matrix by adopting the first encryption key (real number) and logistic function. Step 3 We apply GSVD between the resulting image matrix after the first encoding contained in the second step above and the matrix that was created in the first step above to perform a second encryption step, the final encryption is two steps of encryption which adds complexity to the image encryption makes it difficult to penetrate by hackers. The results we obtained by implementing this algorithm were excellent and compete readings for modern algorithms. It is superior to accuracy and quality. Therefore, this algorithm can be adopted in information security.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":null,"pages":null},"PeriodicalIF":1.1000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47974/jim-1629","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"MATHEMATICS","Score":null,"Total":0}
引用次数: 0
Abstract
In this algorithm the development of a previous algorithm was a master’s thesis by researcher Maher AL-Bashkani. Where he used a technique (gsvd) with Logistic function to encrypt the image through a composite key which is two keys. The first is a real number and the second is a picture. In this algorithm we will call it (MK-11) we will dispense with the second key (picture) and with only the first key (real number). We will generate a 3D matrix that represents another key we create through the work of our algorithm. This is a new method that has not been used by previous algorithms. We know nothing about this triple matrix we create by implementing the algorithm. Therefore, this algorithm is considered very excellent and possesses high immunity against hackers who try to break the encryption. The work of this algorithm focuses on three steps: The first is to create an array with the same dimensions as the image we want to encode depending on the numerical components of the image matrix as we will see later. The second step is the first distraction of the image matrix by adopting the first encryption key (real number) and logistic function. Step 3 We apply GSVD between the resulting image matrix after the first encoding contained in the second step above and the matrix that was created in the first step above to perform a second encryption step, the final encryption is two steps of encryption which adds complexity to the image encryption makes it difficult to penetrate by hackers. The results we obtained by implementing this algorithm were excellent and compete readings for modern algorithms. It is superior to accuracy and quality. Therefore, this algorithm can be adopted in information security.
期刊介绍:
The Journal of Interdisciplinary Mathematics (JIM) is a world leading journal publishing high quality, rigorously peer-reviewed original research in mathematical applications to different disciplines, and to the methodological and theoretical role of mathematics in underpinning all scientific disciplines. The scope is intentionally broad, but papers must make a novel contribution to the fields covered in order to be considered for publication. Topics include, but are not limited, to the following: • Interface of Mathematics with other Disciplines • Theoretical Role of Mathematics • Methodological Role of Mathematics • Interface of Statistics with other Disciplines • Cognitive Sciences • Applications of Mathematics • Industrial Mathematics • Dynamical Systems • Mathematical Biology • Fuzzy Mathematics The journal considers original research articles, survey articles, and book reviews for publication. Responses to articles and correspondence will also be considered at the Editor-in-Chief’s discretion. Special issue proposals in cutting-edge and timely areas of research in interdisciplinary mathematical research are encouraged – please contact the Editor-in-Chief in the first instance.