TY - JOUR
T1 - Image Encryption using a Binary Search Tree Structure-Based Key
AU - Al-Husainy, Mohammed Abbas Fadhil
AU - Al-Sewadi, Hamza A.A.
AU - Al-Shargabi, Bassam
N1 - Publisher Copyright:
© 2022 Bogataj, CC BY 4.0.
PY - 2021/8/23
Y1 - 2021/8/23
N2 - Due to the ever-increasing cybercrime and hazards on digital information stored or in transit over computer clouds and networks, so many encryption algorithms were developed and practically implemented. On the other hand, hackers and intruders keep on developing methods to break those algorithms. Hence, new methods are always sought and developed by researchers. A binary search tree (BST) is implemented in this paper to produce a new algorithm for image encryption. The BST is utilized to generate an encryption key that consists of two parts; local and global with flexible length capabilities that provide better security. Sharing all image contents to encrypt any byte of the source image helped to achieve Shannon’s concept of diffusion and confusion. The experimental application of this algorithm has manifested a satisfactory security performance as compared with the widely used cryptographic systems such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES). These Comparisons included measurement of encryption time complexity, Peak Signal to Noise Ratio (PSNR), Entropy, encryption key space. Besides, the new method offers encryption key length flexibility and involvement of all image contents in its generation.
AB - Due to the ever-increasing cybercrime and hazards on digital information stored or in transit over computer clouds and networks, so many encryption algorithms were developed and practically implemented. On the other hand, hackers and intruders keep on developing methods to break those algorithms. Hence, new methods are always sought and developed by researchers. A binary search tree (BST) is implemented in this paper to produce a new algorithm for image encryption. The BST is utilized to generate an encryption key that consists of two parts; local and global with flexible length capabilities that provide better security. Sharing all image contents to encrypt any byte of the source image helped to achieve Shannon’s concept of diffusion and confusion. The experimental application of this algorithm has manifested a satisfactory security performance as compared with the widely used cryptographic systems such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES). These Comparisons included measurement of encryption time complexity, Peak Signal to Noise Ratio (PSNR), Entropy, encryption key space. Besides, the new method offers encryption key length flexibility and involvement of all image contents in its generation.
KW - Avalanche-Effect
KW - Binary Search Tree
KW - Cryptography
KW - Data-security
KW - Image-Encryption
UR - http://www.scopus.com/inward/record.url?scp=85159922662&partnerID=8YFLogxK
U2 - 10.12785/ijcds/120168
DO - 10.12785/ijcds/120168
M3 - Article
AN - SCOPUS:85159922662
SN - 2210-142X
VL - 13
SP - 823
EP - 836
JO - International Journal of Computing and Digital Systems
JF - International Journal of Computing and Digital Systems
IS - 1
ER -