{"title":"基于三维s盒加密算法的安全图像传输","authors":"Mohamed Boussif, A. Mnassri","doi":"10.1109/IC_ASET53395.2022.9765904","DOIUrl":null,"url":null,"abstract":"It is known that information security and privacy revolve around three principal keys: confidentiality, integrity, and availability. Depending on the environment, application, context, or use case, one of these principles may prevail over the others. For a medical application, for example, confidentiality is essential. Therefore, any imaging transferred electronically must be encrypted to prevent unauthorized persons from seeing its contents. This paper exhibits a new efficient ciphering algorithm for the security of transmitted images in public networks such as the Internet or archived in cloud computing based on a three-dimensional S-box. The suggested method encrypts and decrypts the image block by block. Each block is 8x8 pixels. The encrypted data are obtained by replacing the original data and the key by its value in S-box. Substitution boxes (S-box) are generated using a proposed algorithm that produces a 3D S-box using the random function and permutation. The security analyses show that the presented algorithm has an important security level. The runtime of the proposed algorithms is fast compared to others image encryption algorithms.","PeriodicalId":6874,"journal":{"name":"2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)","volume":"58 1","pages":"17-22"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Secure Images Transmission Using a Three-Dimensional S-Box-Based Encryption Algorithm\",\"authors\":\"Mohamed Boussif, A. Mnassri\",\"doi\":\"10.1109/IC_ASET53395.2022.9765904\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is known that information security and privacy revolve around three principal keys: confidentiality, integrity, and availability. Depending on the environment, application, context, or use case, one of these principles may prevail over the others. For a medical application, for example, confidentiality is essential. Therefore, any imaging transferred electronically must be encrypted to prevent unauthorized persons from seeing its contents. This paper exhibits a new efficient ciphering algorithm for the security of transmitted images in public networks such as the Internet or archived in cloud computing based on a three-dimensional S-box. The suggested method encrypts and decrypts the image block by block. Each block is 8x8 pixels. The encrypted data are obtained by replacing the original data and the key by its value in S-box. Substitution boxes (S-box) are generated using a proposed algorithm that produces a 3D S-box using the random function and permutation. The security analyses show that the presented algorithm has an important security level. The runtime of the proposed algorithms is fast compared to others image encryption algorithms.\",\"PeriodicalId\":6874,\"journal\":{\"name\":\"2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)\",\"volume\":\"58 1\",\"pages\":\"17-22\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC_ASET53395.2022.9765904\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC_ASET53395.2022.9765904","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Images Transmission Using a Three-Dimensional S-Box-Based Encryption Algorithm
It is known that information security and privacy revolve around three principal keys: confidentiality, integrity, and availability. Depending on the environment, application, context, or use case, one of these principles may prevail over the others. For a medical application, for example, confidentiality is essential. Therefore, any imaging transferred electronically must be encrypted to prevent unauthorized persons from seeing its contents. This paper exhibits a new efficient ciphering algorithm for the security of transmitted images in public networks such as the Internet or archived in cloud computing based on a three-dimensional S-box. The suggested method encrypts and decrypts the image block by block. Each block is 8x8 pixels. The encrypted data are obtained by replacing the original data and the key by its value in S-box. Substitution boxes (S-box) are generated using a proposed algorithm that produces a 3D S-box using the random function and permutation. The security analyses show that the presented algorithm has an important security level. The runtime of the proposed algorithms is fast compared to others image encryption algorithms.