1Department of Computer Science, Faculty of Communication and Information Technology, Kwara State University, Malete, Kwara State, Nigeria
2Department of Computer Science, College of Natural and Applied Sciences, Summit University, Offa, Kwara State, Nigeria
3Department of Telecommunication Science, Faculty of Communication and Information Sciences, University of Ilorin, Kwara State, Nigeria
BibTex Citation Data :
@article{JTSISKOM14038, author = {Akinbowale Nathaniel Babatunde and Afeez Adeshina Oke and Abdulkareem Ayopo Oloyede and Aisha Oiza Bello}, title = {Enhanced image security using residue number system and new Arnold transform}, journal = {Jurnal Teknologi dan Sistem Komputer}, volume = {9}, number = {4}, year = {2021}, keywords = {cryptosystem; forward conversion; residue number system; reverse conversion}, abstract = {This paper aims to improve the image scrambling and encryption effect in traditional two-dimensional discrete Arnold transform by introducing a new Residue number system (RNS) with three moduli and the New Arnold Transform. The study focuses on improving the classical discrete Arnold transform with quasi-affine properties, applying image scrambling and encryption research. The design of the method is explicit to three moduli set \{2 n , 2 n+1 +1, 2 n+1 -1\}. These moduli set includes equalized and shapely moduli leading to the effective execution of the residue to binary converter. The study employs an arithmetic residue to the binary converter and an improved Arnold transformation algorithm. The encryption process uses MATLAB to accept a digital image input and subsequently convert the image into an RNS representation. The images are connected as a group. The resulting encrypted image uses the Arnold transformation algorithm. The encrypted image is used as input at decryption using the anti-Arnold (Reverse Arnold) transformation algorithm to convert the picture to the original RNS (original pixel value). Then the RNS was used to retransform the original RNS to its binary form. Security analysis tests, like histogram analysis, keyspace, key sensitivity, and correlation coefficient analysis, were administered on the encrypted image. Results show that the hybrid system can use the improved Arnold transform algorithm with better security and no constraint on image width and size.}, issn = {2338-0403}, pages = {205--210} doi = {10.14710/jtsiskom.2021.14038}, url = {https://jtsiskom.undip.ac.id/article/view/14038} }
Refworks Citation Data :
Article Metrics:
Last update:
Last update: 2024-12-30 05:18:49
Starting from 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JTSiskom will not be held responsible for anything arising because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.