Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A New Technique for Designing 8 x 8 Substitution Box for Image Encryption Applications

Full metadata record
DC FieldValueLanguage
dc.contributor.authorKhan, Fadia Ali-
dc.contributor.authorAhmed, Jameel-
dc.contributor.authorKhan, Jan Sher-
dc.contributor.authorAhmad, Jawad-
dc.contributor.authorKhan, Muazzam A.-
dc.contributor.authorHwang, Seong Oun-
dc.date.accessioned2022-06-10T05:40:20Z-
dc.date.available2022-06-10T05:40:20Z-
dc.date.created2022-06-10-
dc.date.issued2017-
dc.identifier.issn2472-1530-
dc.identifier.urihttps://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/28146-
dc.description.abstractTo create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secure encryption algorithm, substitution plays a key role during confusion stage of encryption algorithms. In this work, we present a novel chaos-based substitution box that can be utilized in the encryption processes for securing digital images from eavesdroppers. The proposed substitution box is also compared with other conventional substitution boxes presented in literature. Various statistical measures such as contrast, correlation, energy and homogeneity analysis prove the superiority of the proposed substitution box.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-
dc.subjectS-BOXES-
dc.subjectCHAOTIC SYSTEM-
dc.subjectMAPS-
dc.subjectALGORITHM-
dc.subjectEFFICIENT-
dc.titleA New Technique for Designing 8 x 8 Substitution Box for Image Encryption Applications-
dc.typeArticle-
dc.contributor.affiliatedAuthorHwang, Seong Oun-
dc.identifier.wosid000417414900002-
dc.identifier.bibliographicCitation2017 9TH COMPUTER SCIENCE AND ELECTRONIC ENGINEERING (CEEC)-
dc.relation.isPartOf2017 9TH COMPUTER SCIENCE AND ELECTRONIC ENGINEERING (CEEC)-
dc.citation.title2017 9TH COMPUTER SCIENCE AND ELECTRONIC ENGINEERING (CEEC)-
dc.type.rimsART-
dc.type.docTypeProceedings Paper-
dc.description.journalClass3-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusS-BOXES-
dc.subject.keywordPlusCHAOTIC SYSTEM-
dc.subject.keywordPlusMAPS-
dc.subject.keywordPlusALGORITHM-
dc.subject.keywordPlusEFFICIENT-
dc.subject.keywordAuthorSubstitution box-
dc.subject.keywordAuthorchaotic map-
dc.subject.keywordAuthorimage encryption-
dc.subject.keywordAuthorstatistical analyses-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Computer and Information Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE