RSA algorithm in fractional-rational n-ary forms while encryption-decryption of monochrome images

dc.citation.epage15
dc.citation.issue3
dc.citation.journalTitleВимірювальна техніка та метрологія
dc.citation.spage11
dc.citation.volume83
dc.contributor.affiliationLviv Polytechnic National University
dc.contributor.authorKovalchuk, Anatoliy
dc.contributor.authorKustra, Nataliia
dc.contributor.authorYatsyshyn, Svyatoslav
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.date.accessioned2023-05-09T10:30:44Z
dc.date.available2023-05-09T10:30:44Z
dc.date.created2022-02-28
dc.date.issued2022-02-28
dc.description.abstractThe basis for image protection is the assumption that the image is a stochastic signal. But the image is a specific signal that possesses, in addition to typical informativeness (informativeness of data), also visual informativeness, which brings new challenges to the issue of protection. Therefore, the urgent task is to implement such application of the RSA algorithm that when encrypting an image: the cryptographic stability of the RSA algorithm did not deteriorate; achieves full image noise to prevent the use of visual image processing methods. An algorithm for encryption-decryption of monochrome images in fractional-rational forms of order n using the elements of the RSA algorithm is proposed, as the most resistant to unauthorized decryption of signals. The proposed algorithm is applied to images with strictly separated contours. Elements of the RSA algorithm are applied to construct the coefficients of fractional-rational affine transformations. The developed algorithm is inherent in the higher cryptographic stability compared to the ordinary RSA algorithm. The possibilities of using the elements of the RSA algorithm in affine transformations while encrypting and decrypting images are described. The results of encryption modeling for cryptographic transformations of monochrome images of a given dimension are given. Modified models and algorithmic procedures of key formation processes, direct and inverse cryptographic transformations, reduced to mathematical element-by-element operations, have been developed.
dc.format.extent11-15
dc.format.pages5
dc.identifier.citationKovalchuk A. RSA algorithm in fractional-rational n-ary forms while encryption-decryption of monochrome images / Anatoliy Kovalchuk, Nataliia Kustra, Svyatoslav Yatsyshyn // Measuring equipment and metrology. — Lviv : Lviv Politechnic Publishing House, 2022. — Vol 83. — No 3. — P. 11–15.
dc.identifier.citationenKovalchuk A. RSA algorithm in fractional-rational n-ary forms while encryption-decryption of monochrome images / Anatoliy Kovalchuk, Nataliia Kustra, Svyatoslav Yatsyshyn // Measuring equipment and metrology. — Lviv : Lviv Politechnic Publishing House, 2022. — Vol 83. — No 3. — P. 11–15.
dc.identifier.doidoi.org/10.23939/istcmtm2022.03.011
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/59067
dc.language.isoen
dc.publisherВидавництво Львівської політехніки
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofВимірювальна техніка та метрологія, 3 (83), 2022
dc.relation.ispartofMeasuring equipment and metrology, 3 (83), 2022
dc.relation.references[1] B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C, Moscow: Triumf, 2003. https://www.amazon.com/Applied-Cryptography-Protocols-Algorithms-Source/dp.
dc.relation.references[2] B. Jane. Digital Image Processing. Springer – Verlag Berlin Heidelberg, 2005, https://www.amazon.com/Digital-Image-Processing-Algorithms-Applications/dp/3540592989.
dc.relation.references[3] R. C. Gonzales and R. E. Woods. Digital image processing. Prentice Hall, Upper Saddle River, NJ, 2nd ed., 2002. https://www.amazon.com/Digital-Image-Processing-Algorithms-Applications/dp.
dc.relation.references[4] Tsmots I., Riznyk O., Rabyk V., Kynash Y., Kustra N., Logoida M. (2020) Implementation of FPGA-Based Barker’s-Like Codes. In: Lytvynenko V., Babichev S., Wójcik W., Vynokurova O., Vyshemyrskaya S., Radetskaya S. (eds) “Lecture Notes in Computational Intelligence and Decision Making”. ISDMCI 2019. Advances in Intelligent Systems and Computing, vol. 1020. Springer, Cham. DOI: 10.1007/978-3-030-26474-1_15.
dc.relation.references[5] Rafael C. Gonzalez, Richard E. Woods, “Digital Image Processing”, published by Prentice Hall Upper Saddle River, New Jersey, 07456. http://sdeuoc.ac.in/sites/default /files/sde_videos.pdf
dc.relation.references[6] A. Kovalchuk, I. Izonin, C. Strauss, M. Podavalkina, N. Lotoshynska, N. Kustra. “Image encryption and decryption schemes using linear and quadratic fractal algorithms and their systems”, CEUR Workshop Proceedings, vol. 2533, 2019, pp. 139–150. https://doi.org/10.23939/istcmtm2020.04.025
dc.relation.references[7] A. Kovalchuk, I. Izonin, Gregush Ml, M., N. Lotoshyiiska, “An approach towards image encryption and decryption using quaternary fractional-linear operations”, Procedia Computer Science, vol. 160, 2019, pp. 491–496. Conference Paper (Open Access). DOI: 10.1016 /j.procs. 2019.11.059.
dc.relation.references[8] B. Girod “The information theoretical significance of spatial and temporal masking in video signals”, Proc. of the SPIE Symposium on Electronic Imaging, vol. 1077, pp. 178–187, 1989. https://typeset.io/papers/the-information-theoreticalsignificance-of-spatial-and-2bas6i0mgw.
dc.relation.references[9] Majid Rabbani, Rajan Joshi. “An overview of the JPEG2000 still image compression standard”, Eastman Kodak Company, Rochester, NY 14650, USA, Signal Processing: Image Communication, vol. 17, pp. 3–48, 2002. https://scirp.org/reference/referencespapers.aspx?referenceid=727652.
dc.relation.references[10] S. X. Liao and M. Pawlak On image analysis by moments, IEEE Transaction on Pattern Analysis and Machine Intelligence, 18, No 3, pp. 254–266, 1996. https://ieeexplore.ieee.org/document/485554.
dc.relation.references[11] E.M. Haacke, R.W. Brown, M.R. Thompson and R. Venkatesan. Magnetic Resonance Imagin: Physical Principles and Sequence Design. John Wiley & Sons, New York, 1999. https://www.wiley.com/ensg/Magnetic+ Resonance+Imaging:+Physical+Principles+and+Sequence+Design,+2nd+Edition-p-9780471720850.
dc.relation.references[12] J. T. Kajiya. The rendering equation. Computer Graphics, 20: 143–150, 1986. https://dl.acm.org/doi/10.1145/15886.15902.
dc.relation.references[13] M. Sarfraz. Introductory Chapter: On Digital Image Processing. 2020, DOI: 10.5772 intechopen.92060, https://www.intechopen.com/chapters/71817.
dc.relation.references[14] Ehsan Samei, Donald J Peck, Projection X-ray Imaging, Hendee’s Physics of Medical Imaging, 10.1002 9781118671016, (217–242), 2019. https://onlinelibrary.wiley.com/doi/10.1002/9781118671016.ch6.
dc.relation.references[15] Michael Vollmer, Klaus-Peter Mollmann, Fundamentals of Infrared Thermal Imaging, Infrared Thermal Imaging, 10.1002 9783527693306, (1–106), 2017. https://www.wiley.com/enus/Infrared+Thermal+Imaging:+Fundamentals,+Research+and+Applications,+2nd+Edition-p-9783527413515.
dc.relation.references[16] Usmonov, B., Evsutin, O., Iskhakov, A., Shelupanov, A., Iskhakova, A., & Meshcheryakov, R. (2017, November). The cybersecurity in development of IoT embedded technologies. In 2017 International Conference on Information Science and Communications Technologies (ICISCT) IEEE, pp. 1–4. DOI: 10.1109/ICISCT.2017.8188589.
dc.relation.references[17] Wagh, D. P., Fadewar, H. S., & Shinde, G. N. Biometric Finger Vein Recognition Methods for Authentication. In Computing in Engineering and Technology, pp. 45–53, 2020. DOI: 10.1007/978-981-32-9515-5_5.
dc.relation.referencesen[1] B. Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C, Moscow: Triumf, 2003. https://www.amazon.com/Applied-Cryptography-Protocols-Algorithms-Source/dp.
dc.relation.referencesen[2] B. Jane. Digital Image Processing. Springer – Verlag Berlin Heidelberg, 2005, https://www.amazon.com/Digital-Image-Processing-Algorithms-Applications/dp/3540592989.
dc.relation.referencesen[3] R. C. Gonzales and R. E. Woods. Digital image processing. Prentice Hall, Upper Saddle River, NJ, 2nd ed., 2002. https://www.amazon.com/Digital-Image-Processing-Algorithms-Applications/dp.
dc.relation.referencesen[4] Tsmots I., Riznyk O., Rabyk V., Kynash Y., Kustra N., Logoida M. (2020) Implementation of FPGA-Based Barker’s-Like Codes. In: Lytvynenko V., Babichev S., Wójcik W., Vynokurova O., Vyshemyrskaya S., Radetskaya S. (eds) "Lecture Notes in Computational Intelligence and Decision Making". ISDMCI 2019. Advances in Intelligent Systems and Computing, vol. 1020. Springer, Cham. DOI: 10.1007/978-3-030-26474-1_15.
dc.relation.referencesen[5] Rafael C. Gonzalez, Richard E. Woods, "Digital Image Processing", published by Prentice Hall Upper Saddle River, New Jersey, 07456. http://sdeuoc.ac.in/sites/default /files/sde_videos.pdf
dc.relation.referencesen[6] A. Kovalchuk, I. Izonin, C. Strauss, M. Podavalkina, N. Lotoshynska, N. Kustra. "Image encryption and decryption schemes using linear and quadratic fractal algorithms and their systems", CEUR Workshop Proceedings, vol. 2533, 2019, pp. 139–150. https://doi.org/10.23939/istcmtm2020.04.025
dc.relation.referencesen[7] A. Kovalchuk, I. Izonin, Gregush Ml, M., N. Lotoshyiiska, "An approach towards image encryption and decryption using quaternary fractional-linear operations", Procedia Computer Science, vol. 160, 2019, pp. 491–496. Conference Paper (Open Access). DOI: 10.1016 /j.procs. 2019.11.059.
dc.relation.referencesen[8] B. Girod "The information theoretical significance of spatial and temporal masking in video signals", Proc. of the SPIE Symposium on Electronic Imaging, vol. 1077, pp. 178–187, 1989. https://typeset.io/papers/the-information-theoreticalsignificance-of-spatial-and-2bas6i0mgw.
dc.relation.referencesen[9] Majid Rabbani, Rajan Joshi. "An overview of the JPEG2000 still image compression standard", Eastman Kodak Company, Rochester, NY 14650, USA, Signal Processing: Image Communication, vol. 17, pp. 3–48, 2002. https://scirp.org/reference/referencespapers.aspx?referenceid=727652.
dc.relation.referencesen[10] S. X. Liao and M. Pawlak On image analysis by moments, IEEE Transaction on Pattern Analysis and Machine Intelligence, 18, No 3, pp. 254–266, 1996. https://ieeexplore.ieee.org/document/485554.
dc.relation.referencesen[11] E.M. Haacke, R.W. Brown, M.R. Thompson and R. Venkatesan. Magnetic Resonance Imagin: Physical Principles and Sequence Design. John Wiley & Sons, New York, 1999. https://www.wiley.com/ensg/Magnetic+ Resonance+Imaging:+Physical+Principles+and+Sequence+Design,+2nd+Edition-p-9780471720850.
dc.relation.referencesen[12] J. T. Kajiya. The rendering equation. Computer Graphics, 20: 143–150, 1986. https://dl.acm.org/doi/10.1145/15886.15902.
dc.relation.referencesen[13] M. Sarfraz. Introductory Chapter: On Digital Image Processing. 2020, DOI: 10.5772 intechopen.92060, https://www.intechopen.com/chapters/71817.
dc.relation.referencesen[14] Ehsan Samei, Donald J Peck, Projection X-ray Imaging, Hendee’s Physics of Medical Imaging, 10.1002 9781118671016, (217–242), 2019. https://onlinelibrary.wiley.com/doi/10.1002/9781118671016.ch6.
dc.relation.referencesen[15] Michael Vollmer, Klaus-Peter Mollmann, Fundamentals of Infrared Thermal Imaging, Infrared Thermal Imaging, 10.1002 9783527693306, (1–106), 2017. https://www.wiley.com/enus/Infrared+Thermal+Imaging:+Fundamentals,+Research+and+Applications,+2nd+Edition-p-9783527413515.
dc.relation.referencesen[16] Usmonov, B., Evsutin, O., Iskhakov, A., Shelupanov, A., Iskhakova, A., & Meshcheryakov, R. (2017, November). The cybersecurity in development of IoT embedded technologies. In 2017 International Conference on Information Science and Communications Technologies (ICISCT) IEEE, pp. 1–4. DOI: 10.1109/ICISCT.2017.8188589.
dc.relation.referencesen[17] Wagh, D. P., Fadewar, H. S., & Shinde, G. N. Biometric Finger Vein Recognition Methods for Authentication. In Computing in Engineering and Technology, pp. 45–53, 2020. DOI: 10.1007/978-981-32-9515-5_5.
dc.relation.urihttps://www.amazon.com/Applied-Cryptography-Protocols-Algorithms-Source/dp
dc.relation.urihttps://www.amazon.com/Digital-Image-Processing-Algorithms-Applications/dp/3540592989
dc.relation.urihttps://www.amazon.com/Digital-Image-Processing-Algorithms-Applications/dp
dc.relation.urihttp://sdeuoc.ac.in/sites/default
dc.relation.urihttps://doi.org/10.23939/istcmtm2020.04.025
dc.relation.urihttps://typeset.io/papers/the-information-theoreticalsignificance-of-spatial-and-2bas6i0mgw
dc.relation.urihttps://scirp.org/reference/referencespapers.aspx?referenceid=727652
dc.relation.urihttps://ieeexplore.ieee.org/document/485554
dc.relation.urihttps://www.wiley.com/ensg/Magnetic+
dc.relation.urihttps://dl.acm.org/doi/10.1145/15886.15902
dc.relation.urihttps://www.intechopen.com/chapters/71817
dc.relation.urihttps://onlinelibrary.wiley.com/doi/10.1002/9781118671016.ch6
dc.relation.urihttps://www.wiley.com/enus/Infrared+Thermal+Imaging:+Fundamentals,+Research+and+Applications,+2nd+Edition-p-9783527413515
dc.rights.holder© Національний університет “Львівська політехніка”, 2022
dc.subjectEncryption
dc.subjectMonochrome image
dc.subjectFractional-rational affine transformation
dc.subjectContour
dc.subjectDecryption
dc.titleRSA algorithm in fractional-rational n-ary forms while encryption-decryption of monochrome images
dc.typeArticle

Files

Original bundle

Now showing 1 - 2 of 2
Thumbnail Image
Name:
2022v83n3_Kovalchuk_A-RSA_algorithm_in_fractional_11-15.pdf
Size:
967.27 KB
Format:
Adobe Portable Document Format
Thumbnail Image
Name:
2022v83n3_Kovalchuk_A-RSA_algorithm_in_fractional_11-15__COVER.png
Size:
1.47 MB
Format:
Portable Network Graphics

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.78 KB
Format:
Plain Text
Description: