A medical image encryption scheme based on Mobius transformation and Galois field
© 2023 The Authors..
Data security and privacy are considered to be the biggest problems faced by service providers who have worked with public data for a long time. A key element of modern encryption that is utilized to increase textual confusion is the Substitution box (S-box) and the algebraic strength of the S-box has a significant impact on how secure the encryption method is. In this article, we present a unique method that uses a linear fractional transformation on a finite field to produce cryptographically robust S-boxes. Firstly, we choose a specific irreducible polynomial of degree 8 in Z2[x] to construct GF(28). Later, we used the action of PGL(2,GF(28)) on GF(28) to generate a robust S-box. The effectiveness of the built-in S-box was evaluated using several criteria including non-linearity, differential uniformity, strict avalanche criteria, linear approximation probability, and bit independence criterion. The proposed S-box's characteristics are compared to those of most recent S-boxes to confirm the higher performance. Additionally, the S box was used to encrypt images to show its usefulness for multimedia security applications. We performed several tests, including contrast, correlation, homogeneity, entropy, and energy, to evaluate the success of the encryption technique. The proposed method for ciphering an image is very effective, as proven by its comparison with several S boxes.
Medienart: |
E-Artikel |
---|
Erscheinungsjahr: |
2024 |
---|---|
Erschienen: |
2024 |
Enthalten in: |
Zur Gesamtaufnahme - volume:10 |
---|---|
Enthalten in: |
Heliyon - 10(2024), 1 vom: 15. Jan., Seite e23652 |
Sprache: |
Englisch |
---|
Beteiligte Personen: |
Ali, Javed [VerfasserIn] |
---|
Links: |
---|
Themen: |
Correlation |
---|
Anmerkungen: |
Date Revised 10.01.2024 published: Electronic-eCollection Citation Status PubMed-not-MEDLINE |
---|
doi: |
10.1016/j.heliyon.2023.e23652 |
---|
funding: |
|
---|---|
Förderinstitution / Projekttitel: |
|
PPN (Katalog-ID): |
NLM366834568 |
---|
LEADER | 01000naa a22002652 4500 | ||
---|---|---|---|
001 | NLM366834568 | ||
003 | DE-627 | ||
005 | 20240114233553.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240114s2024 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.heliyon.2023.e23652 |2 doi | |
028 | 5 | 2 | |a pubmed24n1255.xml |
035 | |a (DE-627)NLM366834568 | ||
035 | |a (NLM)38192806 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Ali, Javed |e verfasserin |4 aut | |
245 | 1 | 2 | |a A medical image encryption scheme based on Mobius transformation and Galois field |
264 | 1 | |c 2024 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ƒaComputermedien |b c |2 rdamedia | ||
338 | |a ƒa Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Date Revised 10.01.2024 | ||
500 | |a published: Electronic-eCollection | ||
500 | |a Citation Status PubMed-not-MEDLINE | ||
520 | |a © 2023 The Authors. | ||
520 | |a Data security and privacy are considered to be the biggest problems faced by service providers who have worked with public data for a long time. A key element of modern encryption that is utilized to increase textual confusion is the Substitution box (S-box) and the algebraic strength of the S-box has a significant impact on how secure the encryption method is. In this article, we present a unique method that uses a linear fractional transformation on a finite field to produce cryptographically robust S-boxes. Firstly, we choose a specific irreducible polynomial of degree 8 in Z2[x] to construct GF(28). Later, we used the action of PGL(2,GF(28)) on GF(28) to generate a robust S-box. The effectiveness of the built-in S-box was evaluated using several criteria including non-linearity, differential uniformity, strict avalanche criteria, linear approximation probability, and bit independence criterion. The proposed S-box's characteristics are compared to those of most recent S-boxes to confirm the higher performance. Additionally, the S box was used to encrypt images to show its usefulness for multimedia security applications. We performed several tests, including contrast, correlation, homogeneity, entropy, and energy, to evaluate the success of the encryption technique. The proposed method for ciphering an image is very effective, as proven by its comparison with several S boxes | ||
650 | 4 | |a Journal Article | |
650 | 4 | |a Correlation | |
650 | 4 | |a Encryption | |
650 | 4 | |a Entropy | |
650 | 4 | |a Mobius transformation | |
650 | 4 | |a Substitution box | |
650 | 4 | |a primary, 94A60 | |
650 | 4 | |a secondary, 68P25 | |
700 | 1 | |a Jamil, Muhammad Kamran |e verfasserin |4 aut | |
700 | 1 | |a Alali, Amal S |e verfasserin |4 aut | |
700 | 1 | |a Ali, Rashad |e verfasserin |4 aut | |
700 | 1 | |a Gulraiz |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Heliyon |d 2015 |g 10(2024), 1 vom: 15. Jan., Seite e23652 |w (DE-627)NLM255913095 |x 2405-8440 |7 nnns |
773 | 1 | 8 | |g volume:10 |g year:2024 |g number:1 |g day:15 |g month:01 |g pages:e23652 |
856 | 4 | 0 | |u http://dx.doi.org/10.1016/j.heliyon.2023.e23652 |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a GBV_NLM | ||
951 | |a AR | ||
952 | |d 10 |j 2024 |e 1 |b 15 |c 01 |h e23652 |