Abid Abdellah, Hicham Rrghout, Mourad Kattass, A. Jarjar, Abdellhamid Benazzi
{"title":"big S-Boxes for Deeply Improved Hill Image Coding","authors":"Abid Abdellah, Hicham Rrghout, Mourad Kattass, A. Jarjar, Abdellhamid Benazzi","doi":"10.47679/ijasca.v3i1.42","DOIUrl":null,"url":null,"abstract":"This paper introduces a novel approach to encrypt color images, utilizing multiple chaotic maps and working with any size pixel blocks. The encryption procedure commences by converting the original image into a vector, which is then divided into equal dimension subblocks. These blocks undergo a new Vigenère transformation, employing two large dynamic substitution tables interconnected by an enhanced Hill operation using a large invertible matrix generated from a pseudo-random table, controlled by another binary dynamics table. Additionally, the truncated block undergoes the same encryption process using another pseudo-random invertible matrix. To evaluate the effectiveness and resilience of our algorithm, we conducted numerous simulations on randomly selected images of varying sizes and formats from diverse databases.","PeriodicalId":507177,"journal":{"name":"International Journal of Advanced Science and Computer Applications","volume":"4 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Science and Computer Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47679/ijasca.v3i1.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper introduces a novel approach to encrypt color images, utilizing multiple chaotic maps and working with any size pixel blocks. The encryption procedure commences by converting the original image into a vector, which is then divided into equal dimension subblocks. These blocks undergo a new Vigenère transformation, employing two large dynamic substitution tables interconnected by an enhanced Hill operation using a large invertible matrix generated from a pseudo-random table, controlled by another binary dynamics table. Additionally, the truncated block undergoes the same encryption process using another pseudo-random invertible matrix. To evaluate the effectiveness and resilience of our algorithm, we conducted numerous simulations on randomly selected images of varying sizes and formats from diverse databases.