Enhancing Image Cryptography Performance with Block Left Rotation Operations

In today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages from potential threats such as intruders, abu...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammad Subhi Al-Batah, Mowafaq Salem Alzboon, Mazen Alzyoud, Najah Al-Shanableh
Format: Article
Language:English
Published: Wiley 2024-01-01
Series:Applied Computational Intelligence and Soft Computing
Online Access:http://dx.doi.org/10.1155/2024/3641927
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849764004713463808
author Mohammad Subhi Al-Batah
Mowafaq Salem Alzboon
Mazen Alzyoud
Najah Al-Shanableh
author_facet Mohammad Subhi Al-Batah
Mowafaq Salem Alzboon
Mazen Alzyoud
Najah Al-Shanableh
author_sort Mohammad Subhi Al-Batah
collection DOAJ
description In today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages from potential threats such as intruders, abusers, and data hackers becomes imperative. This study introduces an innovative approach aimed at streamlining data protection procedures while concurrently thwarting hacking attempts. At the core of this method lies the utilization of a sophisticated variable content private key designed to facilitate ease of alteration without compromising the integrity of encryption and decryption operations. The pivotal aspect involves leveraging a covert color image to generate this private key, mandating both the sender and receiver to securely retain this image. By employing a selected color image, the private key can seamlessly adapt to match the length of the confidential message. To fortify the level of security, the message is recommended to be segmented into blocks of predetermined sizes, with the sender and receiver jointly establishing these parameters. Subsequently, the bytes within each block are consolidated into a singular vector, which undergoes a left rotation by a predetermined number of bits as specified by the communicating parties. The proposed methodology is empirically validated through the implementation of various color images and text messages. Comparative analyses against existing methods underscore the efficacy and robustness of the proposed approach, substantiating its significant advancements in data protection paradigms.
format Article
id doaj-art-c7d58c75ed8946dfb5a2bce035768496
institution DOAJ
issn 1687-9732
language English
publishDate 2024-01-01
publisher Wiley
record_format Article
series Applied Computational Intelligence and Soft Computing
spelling doaj-art-c7d58c75ed8946dfb5a2bce0357684962025-08-20T03:05:15ZengWileyApplied Computational Intelligence and Soft Computing1687-97322024-01-01202410.1155/2024/3641927Enhancing Image Cryptography Performance with Block Left Rotation OperationsMohammad Subhi Al-Batah0Mowafaq Salem Alzboon1Mazen Alzyoud2Najah Al-Shanableh3Department of Computer ScienceDepartment of Computer ScienceDepartment of Computer ScienceDepartment of Computer ScienceIn today’s interconnected world, the transmission of both lengthy and concise text messages is ubiquitous across diverse communication platforms. With the proliferation of sensitive and specialized information being exchanged, safeguarding these messages from potential threats such as intruders, abusers, and data hackers becomes imperative. This study introduces an innovative approach aimed at streamlining data protection procedures while concurrently thwarting hacking attempts. At the core of this method lies the utilization of a sophisticated variable content private key designed to facilitate ease of alteration without compromising the integrity of encryption and decryption operations. The pivotal aspect involves leveraging a covert color image to generate this private key, mandating both the sender and receiver to securely retain this image. By employing a selected color image, the private key can seamlessly adapt to match the length of the confidential message. To fortify the level of security, the message is recommended to be segmented into blocks of predetermined sizes, with the sender and receiver jointly establishing these parameters. Subsequently, the bytes within each block are consolidated into a singular vector, which undergoes a left rotation by a predetermined number of bits as specified by the communicating parties. The proposed methodology is empirically validated through the implementation of various color images and text messages. Comparative analyses against existing methods underscore the efficacy and robustness of the proposed approach, substantiating its significant advancements in data protection paradigms.http://dx.doi.org/10.1155/2024/3641927
spellingShingle Mohammad Subhi Al-Batah
Mowafaq Salem Alzboon
Mazen Alzyoud
Najah Al-Shanableh
Enhancing Image Cryptography Performance with Block Left Rotation Operations
Applied Computational Intelligence and Soft Computing
title Enhancing Image Cryptography Performance with Block Left Rotation Operations
title_full Enhancing Image Cryptography Performance with Block Left Rotation Operations
title_fullStr Enhancing Image Cryptography Performance with Block Left Rotation Operations
title_full_unstemmed Enhancing Image Cryptography Performance with Block Left Rotation Operations
title_short Enhancing Image Cryptography Performance with Block Left Rotation Operations
title_sort enhancing image cryptography performance with block left rotation operations
url http://dx.doi.org/10.1155/2024/3641927
work_keys_str_mv AT mohammadsubhialbatah enhancingimagecryptographyperformancewithblockleftrotationoperations
AT mowafaqsalemalzboon enhancingimagecryptographyperformancewithblockleftrotationoperations
AT mazenalzyoud enhancingimagecryptographyperformancewithblockleftrotationoperations
AT najahalshanableh enhancingimagecryptographyperformancewithblockleftrotationoperations