Blog

A Variable Circular-Shift Image-Encryption Algorithm

Abdelfatah A. Tamimi and Ayman M. Abdalla

Department of Computer Science, Al-Zaytoonah University of    Jordan,P.O. Box 130, Amman 11733, Jordan

E-mail: drtamimi@ zuj.edu.jo, ayman@zuj.edu.jo


Abstract - A new algorithm is presented for lossless image encryption using a private key. The image is regarded as a stream of bytes, and grouped into variable-length blocks whose sizes depend on the key. Circular shifting is applied to the bits in each block where the number of shifted bits depends on the key. Empirical analysis using different types of test images of different sizes showed that this new algorithm is effective and resistant to statistical attacks. The idea presented by this algorithm may be generalized to apply to input data other than images, and may be combined with other encryption methods.

Keywords: cryptography, stream cipher, block cipher.

Yahya(Tamimi) A.A., Computer networks and Communications (English), Dar Alarab, (2nd Ed., 2004)

Book

Al-Azzah, F., and Yahya(Tamimi) A.A., and Qatawneh M., Computer Tasks (Arabic), Dar AlYazori (2004),

 

Book

www.yasori.com

Yahya(Tamimi), A., and AboEeid, I., Computer Networks and Internet( Arabic), Dar AlYazori, Amman, Jordan, (2006),

Book

www.yasori.com

Tamimi A.A, and Salamah ,Waleed LAN and Intranet (Arabic),” Al Qudes University Press, Amman, Jordan, (2008)

Book

Yahya (Tamimi) , A., and Khalifeh, J., Computer networks and Communications(English), Dar Alyazori, Amman, Jordan, 2009

www.yasori.com

Abdelfatah A. Tamimi, Khaled Moustafa, and Akram Abdelkader, Computer Skills I (Arabic), ISBN 978-9957-12-486-1,Dar Alyazori, Amman, Jordan, 2012

www.yasori.com

Iskandarani, M., Yahya(Tamimi), A., “Neural Network Based Optical Character Recognition System,” International Conference on Computer Vision, Nevada, USA, 2005

http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/y/Yaha:Abdelfatah_A=.html

Yahya (Tamimi), A. A., Abdalla, A.M., “An AES-Based Encryption Algorithm with Shuffling,” In The 2009 International Conference on Security and Management (SAM ’09), Las Vegas, NV, USA. 13-16 July 2009. Printed in Security and Management [eds. H.R. Arabnia and K. Daimi], pp. 113-116, CSREA Press, 2009,

http://www.bibsonomy.org/bibtex/2188e14cd290b3483a24c4075d1b41c0e/dblp

5. Moh’d Belal Al-Zoubi, Al-Dahoud Ali, Abdelfatah A. Yahya(Tamimi), Fuzzy Clustering-Based Approach for Outlier Detection, the 9th WSEAS International Conference on applications of computer engineering, ISBN: 978-960-474-166-3, march 2010, Malaysia

http://dl.acm.org/citation.cfm?id=1844148&CFID=74350994&CFTOKEN=55200339

Contact

إنتهت صفحتي الخاصة

العودة الى الأعلى أو استخدم القائمة إلى اليمين للتنقل

Thanks for downloading!

إلى الأعلى