International Science and Technology Journal
Published by
Under supervision of
Open Access Journal
ISSN: 2519-9854 (Online)
ISSN: 2519-9846 (Print)
A peer-reviewed and open access journal concerned with publishing researches and studies in the field of applied sciences and engineering
An Efficient Text and Image Cryptosystem Based on Block Truncation Coding and Logical XOR Operation
Researcher(s): | - TARAK A. HADDUD
- AHMAD R. KOBAIZ
- KHALEDH. ALGHARARI
|
Institution: | The Higher Institute of Polytechnics, Gharian – Libya University of Aljabal Algharbi Gharian – Libya |
Field: | الهندسة الكهربائية و الالكترونية وهندسة الاتصالات |
Published in: | 9th volume - December 2016 |
الملخص
تشفير المعلومات باستخدام طرق مفتاح التشفير العام لاتزال تستعمل مثل طريقة RSA ولايزال العمل في توليد وعمل مفتاح التشفير ومفتاح فك التشفير مستمرا. هذا البحث تم استخدام طريقة جديدة فى التشفير يمكن استخدامها في المعلومات على هيئة نص كتابي او صورة رقمية ، حيث يحول النص الكتابي الى صورة رقمية والية التشفير تتلخص في ترميز الصورة الرقمية باستخدام BTC واتمام التشفير بجمعها المصفوفة الناتجة مع مصفوفة اخري عشوائية باستخدام XOR حيث المصفوفة الناتجة تكون عالية الامان ويصعب فكها او معرفة محتواها من معلومات.
Abstract
Public Key Cryptography has been widely accepted as the method in which data is encrypted using some algorithms such as the widely known and commonly used RSA algorithm. However, management of the public-key and its storage is an on-going issue. To avoid these problems the symmetric key approach can be used, where there is only one key which it can be used for both encryption and decryption process and it must be kept secret.
In this paper, a particular symmetric key cryptosystem is presented. The main focus of this paper is to encrypt and decrypt text and image data for the purpose of protecting intellectual properties. The text encryption performed by converting the text data into image and then the resulted image is coded using block truncation coding (BTC) technique and finally XOR operation between the coded image data and a randomly generated binary matrix is performed. The main advantages of the proposed cryptosystem represented in the provided high level of security since breaking this cryptosystem depends on breaking its encryption and decryption key. The key is randomly generated in a form of binary matrix which makes it really hard even impossible to be broken.