RSA algorithm in fractional-rational n-ary forms while encryption-decryption of monochrome images
dc.citation.epage | 15 | |
dc.citation.issue | 3 | |
dc.citation.journalTitle | Вимірювальна техніка та метрологія | |
dc.citation.spage | 11 | |
dc.citation.volume | 83 | |
dc.contributor.affiliation | Lviv Polytechnic National University | |
dc.contributor.author | Kovalchuk, Anatoliy | |
dc.contributor.author | Kustra, Nataliia | |
dc.contributor.author | Yatsyshyn, Svyatoslav | |
dc.coverage.placename | Львів | |
dc.coverage.placename | Lviv | |
dc.date.accessioned | 2023-05-09T10:30:44Z | |
dc.date.available | 2023-05-09T10:30:44Z | |
dc.date.created | 2022-02-28 | |
dc.date.issued | 2022-02-28 | |
dc.description.abstract | The basis for image protection is the assumption that the image is a stochastic signal. But the image is a specific signal that possesses, in addition to typical informativeness (informativeness of data), also visual informativeness, which brings new challenges to the issue of protection. Therefore, the urgent task is to implement such application of the RSA algorithm that when encrypting an image: the cryptographic stability of the RSA algorithm did not deteriorate; achieves full image noise to prevent the use of visual image processing methods. An algorithm for encryption-decryption of monochrome images in fractional-rational forms of order n using the elements of the RSA algorithm is proposed, as the most resistant to unauthorized decryption of signals. The proposed algorithm is applied to images with strictly separated contours. Elements of the RSA algorithm are applied to construct the coefficients of fractional-rational affine transformations. The developed algorithm is inherent in the higher cryptographic stability compared to the ordinary RSA algorithm. The possibilities of using the elements of the RSA algorithm in affine transformations while encrypting and decrypting images are described. The results of encryption modeling for cryptographic transformations of monochrome images of a given dimension are given. Modified models and algorithmic procedures of key formation processes, direct and inverse cryptographic transformations, reduced to mathematical element-by-element operations, have been developed. | |
dc.format.extent | 11-15 | |
dc.format.pages | 5 | |
dc.identifier.citation | Kovalchuk A. RSA algorithm in fractional-rational n-ary forms while encryption-decryption of monochrome images / Anatoliy Kovalchuk, Nataliia Kustra, Svyatoslav Yatsyshyn // Measuring equipment and metrology. — Lviv : Lviv Politechnic Publishing House, 2022. — Vol 83. — No 3. — P. 11–15. | |
dc.identifier.citationen | Kovalchuk A. RSA algorithm in fractional-rational n-ary forms while encryption-decryption of monochrome images / Anatoliy Kovalchuk, Nataliia Kustra, Svyatoslav Yatsyshyn // Measuring equipment and metrology. — Lviv : Lviv Politechnic Publishing House, 2022. — Vol 83. — No 3. — P. 11–15. | |
dc.identifier.doi | doi.org/10.23939/istcmtm2022.03.011 | |
dc.identifier.uri | https://ena.lpnu.ua/handle/ntb/59067 | |
dc.language.iso | en | |
dc.publisher | Видавництво Львівської політехніки | |
dc.publisher | Lviv Politechnic Publishing House | |
dc.relation.ispartof | Вимірювальна техніка та метрологія, 3 (83), 2022 | |
dc.relation.ispartof | Measuring equipment and metrology, 3 (83), 2022 | |
dc.relation.references | [1] B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C, Moscow: Triumf, 2003. https://www.amazon.com/Applied-Cryptography-Protocols-Algorithms-Source/dp. | |
dc.relation.references | [2] B. Jane. Digital Image Processing. Springer – Verlag Berlin Heidelberg, 2005, https://www.amazon.com/Digital-Image-Processing-Algorithms-Applications/dp/3540592989. | |
dc.relation.references | [3] R. C. Gonzales and R. E. Woods. Digital image processing. Prentice Hall, Upper Saddle River, NJ, 2nd ed., 2002. https://www.amazon.com/Digital-Image-Processing-Algorithms-Applications/dp. | |
dc.relation.references | [4] Tsmots I., Riznyk O., Rabyk V., Kynash Y., Kustra N., Logoida M. (2020) Implementation of FPGA-Based Barker’s-Like Codes. In: Lytvynenko V., Babichev S., Wójcik W., Vynokurova O., Vyshemyrskaya S., Radetskaya S. (eds) “Lecture Notes in Computational Intelligence and Decision Making”. ISDMCI 2019. Advances in Intelligent Systems and Computing, vol. 1020. Springer, Cham. DOI: 10.1007/978-3-030-26474-1_15. | |
dc.relation.references | [5] Rafael C. Gonzalez, Richard E. Woods, “Digital Image Processing”, published by Prentice Hall Upper Saddle River, New Jersey, 07456. http://sdeuoc.ac.in/sites/default /files/sde_videos.pdf | |
dc.relation.references | [6] A. Kovalchuk, I. Izonin, C. Strauss, M. Podavalkina, N. Lotoshynska, N. Kustra. “Image encryption and decryption schemes using linear and quadratic fractal algorithms and their systems”, CEUR Workshop Proceedings, vol. 2533, 2019, pp. 139–150. https://doi.org/10.23939/istcmtm2020.04.025 | |
dc.relation.references | [7] A. Kovalchuk, I. Izonin, Gregush Ml, M., N. Lotoshyiiska, “An approach towards image encryption and decryption using quaternary fractional-linear operations”, Procedia Computer Science, vol. 160, 2019, pp. 491–496. Conference Paper (Open Access). DOI: 10.1016 /j.procs. 2019.11.059. | |
dc.relation.references | [8] B. Girod “The information theoretical significance of spatial and temporal masking in video signals”, Proc. of the SPIE Symposium on Electronic Imaging, vol. 1077, pp. 178–187, 1989. https://typeset.io/papers/the-information-theoreticalsignificance-of-spatial-and-2bas6i0mgw. | |
dc.relation.references | [9] Majid Rabbani, Rajan Joshi. “An overview of the JPEG2000 still image compression standard”, Eastman Kodak Company, Rochester, NY 14650, USA, Signal Processing: Image Communication, vol. 17, pp. 3–48, 2002. https://scirp.org/reference/referencespapers.aspx?referenceid=727652. | |
dc.relation.references | [10] S. X. Liao and M. Pawlak On image analysis by moments, IEEE Transaction on Pattern Analysis and Machine Intelligence, 18, No 3, pp. 254–266, 1996. https://ieeexplore.ieee.org/document/485554. | |
dc.relation.references | [11] E.M. Haacke, R.W. Brown, M.R. Thompson and R. Venkatesan. Magnetic Resonance Imagin: Physical Principles and Sequence Design. John Wiley & Sons, New York, 1999. https://www.wiley.com/ensg/Magnetic+ Resonance+Imaging:+Physical+Principles+and+Sequence+Design,+2nd+Edition-p-9780471720850. | |
dc.relation.references | [12] J. T. Kajiya. The rendering equation. Computer Graphics, 20: 143–150, 1986. https://dl.acm.org/doi/10.1145/15886.15902. | |
dc.relation.references | [13] M. Sarfraz. Introductory Chapter: On Digital Image Processing. 2020, DOI: 10.5772 intechopen.92060, https://www.intechopen.com/chapters/71817. | |
dc.relation.references | [14] Ehsan Samei, Donald J Peck, Projection X-ray Imaging, Hendee’s Physics of Medical Imaging, 10.1002 9781118671016, (217–242), 2019. https://onlinelibrary.wiley.com/doi/10.1002/9781118671016.ch6. | |
dc.relation.references | [15] Michael Vollmer, Klaus-Peter Mollmann, Fundamentals of Infrared Thermal Imaging, Infrared Thermal Imaging, 10.1002 9783527693306, (1–106), 2017. https://www.wiley.com/enus/Infrared+Thermal+Imaging:+Fundamentals,+Research+and+Applications,+2nd+Edition-p-9783527413515. | |
dc.relation.references | [16] Usmonov, B., Evsutin, O., Iskhakov, A., Shelupanov, A., Iskhakova, A., & Meshcheryakov, R. (2017, November). The cybersecurity in development of IoT embedded technologies. In 2017 International Conference on Information Science and Communications Technologies (ICISCT) IEEE, pp. 1–4. DOI: 10.1109/ICISCT.2017.8188589. | |
dc.relation.references | [17] Wagh, D. P., Fadewar, H. S., & Shinde, G. N. Biometric Finger Vein Recognition Methods for Authentication. In Computing in Engineering and Technology, pp. 45–53, 2020. DOI: 10.1007/978-981-32-9515-5_5. | |
dc.relation.referencesen | [1] B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C, Moscow: Triumf, 2003. https://www.amazon.com/Applied-Cryptography-Protocols-Algorithms-Source/dp. | |
dc.relation.referencesen | [2] B. Jane. Digital Image Processing. Springer – Verlag Berlin Heidelberg, 2005, https://www.amazon.com/Digital-Image-Processing-Algorithms-Applications/dp/3540592989. | |
dc.relation.referencesen | [3] R. C. Gonzales and R. E. Woods. Digital image processing. Prentice Hall, Upper Saddle River, NJ, 2nd ed., 2002. https://www.amazon.com/Digital-Image-Processing-Algorithms-Applications/dp. | |
dc.relation.referencesen | [4] Tsmots I., Riznyk O., Rabyk V., Kynash Y., Kustra N., Logoida M. (2020) Implementation of FPGA-Based Barker’s-Like Codes. In: Lytvynenko V., Babichev S., Wójcik W., Vynokurova O., Vyshemyrskaya S., Radetskaya S. (eds) "Lecture Notes in Computational Intelligence and Decision Making". ISDMCI 2019. Advances in Intelligent Systems and Computing, vol. 1020. Springer, Cham. DOI: 10.1007/978-3-030-26474-1_15. | |
dc.relation.referencesen | [5] Rafael C. Gonzalez, Richard E. Woods, "Digital Image Processing", published by Prentice Hall Upper Saddle River, New Jersey, 07456. http://sdeuoc.ac.in/sites/default /files/sde_videos.pdf | |
dc.relation.referencesen | [6] A. Kovalchuk, I. Izonin, C. Strauss, M. Podavalkina, N. Lotoshynska, N. Kustra. "Image encryption and decryption schemes using linear and quadratic fractal algorithms and their systems", CEUR Workshop Proceedings, vol. 2533, 2019, pp. 139–150. https://doi.org/10.23939/istcmtm2020.04.025 | |
dc.relation.referencesen | [7] A. Kovalchuk, I. Izonin, Gregush Ml, M., N. Lotoshyiiska, "An approach towards image encryption and decryption using quaternary fractional-linear operations", Procedia Computer Science, vol. 160, 2019, pp. 491–496. Conference Paper (Open Access). DOI: 10.1016 /j.procs. 2019.11.059. | |
dc.relation.referencesen | [8] B. Girod "The information theoretical significance of spatial and temporal masking in video signals", Proc. of the SPIE Symposium on Electronic Imaging, vol. 1077, pp. 178–187, 1989. https://typeset.io/papers/the-information-theoreticalsignificance-of-spatial-and-2bas6i0mgw. | |
dc.relation.referencesen | [9] Majid Rabbani, Rajan Joshi. "An overview of the JPEG2000 still image compression standard", Eastman Kodak Company, Rochester, NY 14650, USA, Signal Processing: Image Communication, vol. 17, pp. 3–48, 2002. https://scirp.org/reference/referencespapers.aspx?referenceid=727652. | |
dc.relation.referencesen | [10] S. X. Liao and M. Pawlak On image analysis by moments, IEEE Transaction on Pattern Analysis and Machine Intelligence, 18, No 3, pp. 254–266, 1996. https://ieeexplore.ieee.org/document/485554. | |
dc.relation.referencesen | [11] E.M. Haacke, R.W. Brown, M.R. Thompson and R. Venkatesan. Magnetic Resonance Imagin: Physical Principles and Sequence Design. John Wiley & Sons, New York, 1999. https://www.wiley.com/ensg/Magnetic+ Resonance+Imaging:+Physical+Principles+and+Sequence+Design,+2nd+Edition-p-9780471720850. | |
dc.relation.referencesen | [12] J. T. Kajiya. The rendering equation. Computer Graphics, 20: 143–150, 1986. https://dl.acm.org/doi/10.1145/15886.15902. | |
dc.relation.referencesen | [13] M. Sarfraz. Introductory Chapter: On Digital Image Processing. 2020, DOI: 10.5772 intechopen.92060, https://www.intechopen.com/chapters/71817. | |
dc.relation.referencesen | [14] Ehsan Samei, Donald J Peck, Projection X-ray Imaging, Hendee’s Physics of Medical Imaging, 10.1002 9781118671016, (217–242), 2019. https://onlinelibrary.wiley.com/doi/10.1002/9781118671016.ch6. | |
dc.relation.referencesen | [15] Michael Vollmer, Klaus-Peter Mollmann, Fundamentals of Infrared Thermal Imaging, Infrared Thermal Imaging, 10.1002 9783527693306, (1–106), 2017. https://www.wiley.com/enus/Infrared+Thermal+Imaging:+Fundamentals,+Research+and+Applications,+2nd+Edition-p-9783527413515. | |
dc.relation.referencesen | [16] Usmonov, B., Evsutin, O., Iskhakov, A., Shelupanov, A., Iskhakova, A., & Meshcheryakov, R. (2017, November). The cybersecurity in development of IoT embedded technologies. In 2017 International Conference on Information Science and Communications Technologies (ICISCT) IEEE, pp. 1–4. DOI: 10.1109/ICISCT.2017.8188589. | |
dc.relation.referencesen | [17] Wagh, D. P., Fadewar, H. S., & Shinde, G. N. Biometric Finger Vein Recognition Methods for Authentication. In Computing in Engineering and Technology, pp. 45–53, 2020. DOI: 10.1007/978-981-32-9515-5_5. | |
dc.relation.uri | https://www.amazon.com/Applied-Cryptography-Protocols-Algorithms-Source/dp | |
dc.relation.uri | https://www.amazon.com/Digital-Image-Processing-Algorithms-Applications/dp/3540592989 | |
dc.relation.uri | https://www.amazon.com/Digital-Image-Processing-Algorithms-Applications/dp | |
dc.relation.uri | http://sdeuoc.ac.in/sites/default | |
dc.relation.uri | https://doi.org/10.23939/istcmtm2020.04.025 | |
dc.relation.uri | https://typeset.io/papers/the-information-theoreticalsignificance-of-spatial-and-2bas6i0mgw | |
dc.relation.uri | https://scirp.org/reference/referencespapers.aspx?referenceid=727652 | |
dc.relation.uri | https://ieeexplore.ieee.org/document/485554 | |
dc.relation.uri | https://www.wiley.com/ensg/Magnetic+ | |
dc.relation.uri | https://dl.acm.org/doi/10.1145/15886.15902 | |
dc.relation.uri | https://www.intechopen.com/chapters/71817 | |
dc.relation.uri | https://onlinelibrary.wiley.com/doi/10.1002/9781118671016.ch6 | |
dc.relation.uri | https://www.wiley.com/enus/Infrared+Thermal+Imaging:+Fundamentals,+Research+and+Applications,+2nd+Edition-p-9783527413515 | |
dc.rights.holder | © Національний університет “Львівська політехніка”, 2022 | |
dc.subject | Encryption | |
dc.subject | Monochrome image | |
dc.subject | Fractional-rational affine transformation | |
dc.subject | Contour | |
dc.subject | Decryption | |
dc.title | RSA algorithm in fractional-rational n-ary forms while encryption-decryption of monochrome images | |
dc.type | Article |
Files
License bundle
1 - 1 of 1