Image encryption with General Singular Values Decomposition via logistic function by encryption key only real number (method-2)

IF 1.1 Q1 MATHEMATICS JOURNAL OF INTERDISCIPLINARY MATHEMATICS Pub Date : 2023-01-01 DOI:10.47974/jim-1629
Mohammed Abdul-Hameed
{"title":"Image encryption with General Singular Values Decomposition via logistic function by encryption key only real number (method-2)","authors":"Mohammed Abdul-Hameed","doi":"10.47974/jim-1629","DOIUrl":null,"url":null,"abstract":"In this algorithm the development of a previous algorithm was a master’s thesis by researcher Maher AL-Bashkani. Where he used a technique (gsvd) with Logistic function to encrypt the image through a composite key which is two keys. The first is a real number and the second is a picture. In this algorithm we will call it (MK-11) we will dispense with the second key (picture) and with only the first key (real number). We will generate a 3D matrix that represents another key we create through the work of our algorithm. This is a new method that has not been used by previous algorithms. We know nothing about this triple matrix we create by implementing the algorithm. Therefore, this algorithm is considered very excellent and possesses high immunity against hackers who try to break the encryption. The work of this algorithm focuses on three steps: The first is to create an array with the same dimensions as the image we want to encode depending on the numerical components of the image matrix as we will see later. The second step is the first distraction of the image matrix by adopting the first encryption key (real number) and logistic function. Step 3 We apply GSVD between the resulting image matrix after the first encoding contained in the second step above and the matrix that was created in the first step above to perform a second encryption step, the final encryption is two steps of encryption which adds complexity to the image encryption makes it difficult to penetrate by hackers. The results we obtained by implementing this algorithm were excellent and compete readings for modern algorithms. It is superior to accuracy and quality. Therefore, this algorithm can be adopted in information security.","PeriodicalId":46278,"journal":{"name":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","volume":null,"pages":null},"PeriodicalIF":1.1000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOURNAL OF INTERDISCIPLINARY MATHEMATICS","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47974/jim-1629","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"MATHEMATICS","Score":null,"Total":0}
引用次数: 0

Abstract

In this algorithm the development of a previous algorithm was a master’s thesis by researcher Maher AL-Bashkani. Where he used a technique (gsvd) with Logistic function to encrypt the image through a composite key which is two keys. The first is a real number and the second is a picture. In this algorithm we will call it (MK-11) we will dispense with the second key (picture) and with only the first key (real number). We will generate a 3D matrix that represents another key we create through the work of our algorithm. This is a new method that has not been used by previous algorithms. We know nothing about this triple matrix we create by implementing the algorithm. Therefore, this algorithm is considered very excellent and possesses high immunity against hackers who try to break the encryption. The work of this algorithm focuses on three steps: The first is to create an array with the same dimensions as the image we want to encode depending on the numerical components of the image matrix as we will see later. The second step is the first distraction of the image matrix by adopting the first encryption key (real number) and logistic function. Step 3 We apply GSVD between the resulting image matrix after the first encoding contained in the second step above and the matrix that was created in the first step above to perform a second encryption step, the final encryption is two steps of encryption which adds complexity to the image encryption makes it difficult to penetrate by hackers. The results we obtained by implementing this algorithm were excellent and compete readings for modern algorithms. It is superior to accuracy and quality. Therefore, this algorithm can be adopted in information security.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于逻辑函数的加密密钥唯实数广义奇异值分解图像加密(方法-2)
在此算法中,先前算法的发展是研究员Maher AL-Bashkani的硕士论文。其中,他使用了一种带有Logistic函数的gsvd技术,通过两个密钥组成的组合密钥对图像进行加密。第一个是实数,第二个是图片。在这个算法中,我们称之为(MK-11),我们将省略第二个密钥(图片),只使用第一个密钥(实数)。我们将生成一个3D矩阵,表示我们通过算法工作创建的另一个密钥。这是一种以前的算法没有使用过的新方法。通过实现这个算法我们对这个三重矩阵一无所知。因此,该算法被认为是非常优秀的,对试图破解加密的黑客具有很高的免疫力。该算法的工作主要集中在三个步骤上:第一步是创建一个与我们想要编码的图像具有相同尺寸的数组,这取决于我们稍后将看到的图像矩阵的数字分量。第二步是采用第一个加密密钥(实数)和逻辑函数对图像矩阵进行第一次分散。我们在上面第二步中包含的第一次编码后得到的图像矩阵与上面第一步中创建的矩阵之间应用GSVD进行第二步加密,最后的加密是两步加密,增加了图像加密的复杂性,使其难以被黑客渗透。通过实现该算法,我们获得了与现代算法相媲美的优秀结果。它优于精度和质量。因此,该算法可用于信息安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
2.70
自引率
23.50%
发文量
141
期刊介绍: The Journal of Interdisciplinary Mathematics (JIM) is a world leading journal publishing high quality, rigorously peer-reviewed original research in mathematical applications to different disciplines, and to the methodological and theoretical role of mathematics in underpinning all scientific disciplines. The scope is intentionally broad, but papers must make a novel contribution to the fields covered in order to be considered for publication. Topics include, but are not limited, to the following: • Interface of Mathematics with other Disciplines • Theoretical Role of Mathematics • Methodological Role of Mathematics • Interface of Statistics with other Disciplines • Cognitive Sciences • Applications of Mathematics • Industrial Mathematics • Dynamical Systems • Mathematical Biology • Fuzzy Mathematics The journal considers original research articles, survey articles, and book reviews for publication. Responses to articles and correspondence will also be considered at the Editor-in-Chief’s discretion. Special issue proposals in cutting-edge and timely areas of research in interdisciplinary mathematical research are encouraged – please contact the Editor-in-Chief in the first instance.
期刊最新文献
New problem of Lane Emden type via fractional calculus The convergence of new iterations by resolvent ZA-Jungck mappings Existence, uniqueness and stability results for coupled systems of fractional integro-differential equations with fixed and nonlocal anti-periodic boundary conditions Dynamics and control of a mathematical delayed Cholera model On the Contraharmonic-mean Newton’s method(CHN)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1