Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 18
Page No. 7708 - 7715

Performance Enhancement of Image Encryption By Using BK-Cube Network Design

Authors : Ashwaq T. Hashim and Yossra H. Ali

References

Ali, Y.H. and H.A. Ressan, 2016. Image encryption using block cipher based serpent algorithm. Eng. Technol. J., 34: 278-286.
Direct Link  |  

Alshahrani, A.M. and S. Walker, 2015. New approach in symmetric block cipher security using a new cubical technique. Intl. J. Comput. Sci. Inf. Technol., 7: 69-75.
CrossRef  |  Direct Link  |  

Gonzales, R.C. and R.E. Woods, 2002. Digital Image Processing. 2nd Edn., Pearson, London, England, UK., ISBN:978-81-7758-168-3, Pages: 793.

Helal, B.H. and A.T. Hashim, 2010. Measurement of encryption quality of bitmap images with RC6 and two modified version block cipher. Eng. Technol. J., 28: 5603-5613.
Direct Link  |  

Hernandez, J.C., J.M. Sierra, A. Ribagorda, B. Ramos and J.C. Mex-Perera, 2001. Distinguishing TEA from a random permutation: Reduced round versions of TEA do not have the SAC or do not generate random numbers. Proceedings of the 8th IMA International Conference on Cryptography and Coding, December 17-19, 2001, Springer, Cirencester, England, UK., ISBN:978-3-540-43026-1, pp: 374-377.

Padate, R. and A. Patel, 2015. Image encryption and decryption using AES algorithm. Intl. J. Electron. Commun. Eng. Technol., 6: 23-29.
Direct Link  |  

Rivest, R.L., M.J.B. Robshaw, R. Sidney and Y.L. Yin, 1998. The RC6TM block cipher. J. Comput. Syst., 1: 1-21.
Direct Link  |  

Schneier, B., 1996. Applied Cryptography: Protocols, Algorithms and Source Code in C. 2nd Edn., John Wiley & Sons, Hoboken, New Jersey, USA., ISBN:9780471128458, Pages: 758.

Shrivastava, A. and L. Singh, 2016. An efficient RC6 based image cryptography to enhance correlation and entropy. Intl. J. Comput. Appl., 139: 42-49.
Direct Link  |  

Singh, H., D.N. Dhillon and S.S. Bains, 2013. A new approach for image cryptography techniques. Intl. J. Comput. Organ. Trends, 3: 404-408.

Sudha, S.S. and S. Divya, 2015. Cryptography in image using blowfish algorithm. Intl. J. Sci. Res., 4: 1289-1291.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved