메뉴 건너뛰기




Volumn 6, Issue 16, 2011, Pages 4110-4127

Statistical analysis of S-box in image encryption applications based on majority logic criterion

Author keywords

Advanced encryption standard (AES); Affine power affine (APA); Bit independence criterion; Differential linear approximation probability; Lui. J; Mean of absolute deviation analysis (MAD); Residue of prime; S box; SKIPJACK; Strict avalanche criterion

Indexed keywords


EID: 80052669713     PISSN: 19921950     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (71)

References (16)
  • 1
    • 77950377556 scopus 로고    scopus 로고
    • An optimized implementation of the S-Box using residue of prime numbers
    • Abuelyman ES, Alsehibani AAS (2008). An optimized implementation of the S-Box using residue of prime numbers. Int. J. Comput. Sci. Ntwk. Secur., 8(4): 304-309.
    • (2008) Int. J. Comput. Sci. Ntwk. Secur. , vol.8 , Issue.4 , pp. 304-309
    • Abuelyman, E.S.1    Alsehibani, A.A.S.2
  • 2
    • 0038343416 scopus 로고    scopus 로고
    • Steganalysis using image quality metrics
    • Avcibas I, Memon N, Sankur B (2003). Steganalysis using image quality metrics. IEEE T. IM proc., 12(2): 221-229.
    • (2003) IEEE T. IM proc. , vol.12 , Issue.2 , pp. 221-229
    • Avcibas, I.1    Memon, N.2    Sankur, B.3
  • 3
    • 78951479954 scopus 로고    scopus 로고
    • Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
    • Alam GM, Mat Kiah ML, Zaidan BB, Zaidan AA, Alanazi HO (2010). Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Int. J. Phys. Sci., 5(21): 3254-3260.
    • (2010) Int. J. Phys. Sci. , vol.5 , Issue.21 , pp. 3254-3260
    • Alam, G.M.1    Mat Kiah, M.L.2    Zaidan, B.B.3    Zaidan, A.A.4    Alanazi, H.O.5
  • 4
    • 60349092090 scopus 로고    scopus 로고
    • A new S-box structure named Affine-Power-Affine
    • Cui L, Cao Y (2007). A new S-box structure named Affine-Power-Affine. Int. J. Innov. Comput. I., 3(3): 45-53.
    • (2007) Int. J. Innov. Comput. I. , vol.3 , Issue.3 , pp. 45-53
    • Cui, L.1    Cao, Y.2
  • 5
    • 0026221493 scopus 로고
    • Split and merge image segmentation based on localized feature analysis and statistical tests
    • Chen SY, Lin WC, Chen CT (1991). Split and merge image segmentation based on localized feature analysis and statistical tests. Graph Model. IM proc., 53(5): 457-475.
    • (1991) Graph Model. IM proc. , vol.53 , Issue.5 , pp. 457-475
    • Chen, S.Y.1    Lin, W.C.2    Chen, C.T.3
  • 6
    • 0004181422 scopus 로고    scopus 로고
    • AES Algorithm Submission, Available
    • Daemen J, Rijmen V (1999). AES Proposal: Rijndael. AES Algorithm Submission, Available: http://csrc.nist.gov/archive/aes/rijndael/ Rijndael-ammended.pdf.
    • (1999) AES Proposal: Rijndael
    • Daemen, J.1    Rijmen, V.2
  • 7
    • 79956342887 scopus 로고    scopus 로고
    • Image encryption via logistic map function and heap tree
    • Enayatifar R (2011). Image encryption via logistic map function and heap tree. Int. J. Phys. Sci., 6(2): 221:228.
    • (2011) Int. J. Phys. Sci., 6(2): , vol.221 , pp. 228
    • Enayatifar, R.1
  • 8
    • 2942642475 scopus 로고    scopus 로고
    • A vision system for surface roughness characterization using the gray level co-occurrence matrix
    • Gadelmawla ES (2004). A vision system for surface roughness characterization using the gray level co-occurrence matrix. NDT & E. Int., 37(7): 577-588.
    • (2004) NDT & E. Int. , vol.37 , Issue.7 , pp. 577-588
    • Gadelmawla, E.S.1
  • 9
    • 80052654803 scopus 로고    scopus 로고
    • A New Algorithm to Construct Secure Keys for AES
    • Hussain I, Shah T, Mehmood H (2010). A New Algorithm to Construct Secure Keys for AES. Int. J. Cont. Math. Sci., 5(26): 1263-1270.
    • (2010) Int. J. Cont. Math. Sci. , vol.5 , Issue.26 , pp. 1263-1270
    • Hussain, I.1    Shah, T.2    Mehmood, H.3
  • 10
    • 0037746045 scopus 로고    scopus 로고
    • Unsupervised image segmentation using local homogeneity analysis
    • Jing F, Li M, Zhang H, Zhang B (2003). Unsupervised image segmentation using local homogeneity analysis. Proc. ISCAS, 2: 456-459.
    • (2003) Proc. ISCAS , vol.2 , pp. 456-459
    • Jing, F.1    Li, M.2    Zhang, H.3    Zhang, B.4
  • 11
  • 12
    • 80052680833 scopus 로고    scopus 로고
    • Public key cryptosystems based on chaotic Chebyshev polynomials
    • Prasadh K, Ramar K, Gnanajeyaraman R (2009). Public key cryptosystems based on chaotic Chebyshev polynomials. Int. J. Phys. Sci., 1(7): 122-128.
    • (2009) Int. J. Phys. Sci. , vol.1 , Issue.7 , pp. 122-128
    • Prasadh, K.1    Ramar, K.2    Gnanajeyaraman, R.3
  • 14
    • 80052671998 scopus 로고    scopus 로고
    • KEA Algorithm
    • SKIPJACK
    • SKIPJACK (1998). KEA Algorithm. Specifications version, 2(29): 1-23.
    • (1998) Specifications version , vol.2 , Issue.29 , pp. 1-23
  • 16
    • 12244258246 scopus 로고    scopus 로고
    • An Image encryption approach based on chaotic maps
    • Zhang L, Liao X, Wang X (2005). An Image encryption approach based on chaotic maps. Chaos Solution Fract., 24:759-765.
    • (2005) Chaos Solution Fract. , vol.24 , pp. 759-765
    • Zhang, L.1    Liao, X.2    Wang, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.