INTRA CORRELATION DESTRUCTION TECHNIQUEFOR ENCRYPTION DATA

Authors

  • Alaa Mazher Department of Computer Science and Information System. University of Technology. Baghdad- Iraq.

DOI:

https://doi.org/10.24996/ijs.2009.50.1.%25g

Keywords:

CORRELATION , TECHNIQUEFOR

Abstract

The need for efficient technique for data encryption is clear. Our attention will be devoted to design hybrid technique which, consists of simple and efficient methods such as RLE, vector substitution, and matrix operations. The adopted technique consists of three stages. Each stage contains a specific tool that is suitable for varied type of data such as text, image, and video .In first stage, different methods could be applied depending on the source data format: applying Run Length Encoding (RLE) and Addition Neighboring Element (ANE) to the image, audio and video, while pattern matching is applied to text file format . Stage two involves matrix manipulation and rotation. Element substitution is implemented to the matrix in third stage; a key substitution matrix is used for the process of substituting elements of the matrix. The key matrix will be sent to the destination receiver in order to enable him or her to reconstruct the original data. Finally it must be mentioned that a good result have been obtained using arbitrary plain text and standard image (Leena), where some investigations proved that it is so hard to break the encrypted data.

Downloads

Download data is not yet available.

Downloads

Published

2024-10-17

Issue

Section

Computer Science

How to Cite

INTRA CORRELATION DESTRUCTION TECHNIQUEFOR ENCRYPTION DATA. (2024). Iraqi Journal of Science, 50(1), 94-100. https://doi.org/10.24996/ijs.2009.50.1.%g

Similar Articles

31-40 of 253

You may also start an advanced similarity search for this article.