Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Alghamdi, Ahmed M."

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field
    (Hindawi, 2022-02) Asif, Muhammad; Asamoah, Joshua Kiddy K.; Hazzazi, Mohammad Mazyad; Alharbi, Adel R.; Ashraf, Muhammad Usman; Alghamdi, Ahmed M.; 0000-0002-7066-246X
    In the modern world, the security of the digital image is vital due to the frequent communication of digital products over the open network. Accelerated advancement of digital data exchange, the importance of information security in the transmission of data, and its storage has emerged. Multiple uses of the images in the security agencies and the industries and the security of the confidential image data from unauthorized access are emergent and vital. In this paper, Bose Chaudhary Hocquenghem (BCH) codes over the Galois field are used for image encryption. )e BCH codes over the Galois field construct MDS (maximum distance separable) matrices and secret keys for image encryption techniques. )e encrypted image is calculated, by contrast, correlation, energy, homogeneity, and entropy. Histogram analysis of the encrypted image is also assured in this paper. )e proposed image encryption scheme’s security analysis results are improved compared to the original AES algorithm. Further, security agencies can utilize this work for their confidential image data.

Kwame Nkrumah University of Science and Technology copyright © 2002-2025