dc.contributor.author | Majeed, Samer Hammed | |
dc.contributor.author | Jumaa, Noor Kareem | |
dc.contributor.author | Mohamad, Auday A.H. | |
dc.date.accessioned | 2020-07-14T01:24:22Z | |
dc.date.available | 2020-07-14T01:24:22Z | |
dc.date.issued | 2020-09-01 | |
dc.identifier.issn | 2210-142X | |
dc.identifier.uri | https://journal.uob.edu.bh:443/handle/123456789/3901 | |
dc.description.abstract | Images, plain text and multimedia files are the core of this era; one of the main challenges is transferring data from source to destination in encrypted way; so in case a sniffing machine or a sniffing computer can not detect and fetch the original data. This article introduce Taguchi design of experiments method as an optimization tool to measure the best encryption method of images through calculating SNR, Mean and other critical parameters. The test was done using three cryptographic methods (Advanced Encryption Standard AES128, Deoxyribonucleic Acid DNA, and Secure Force SF) with key (Linear Feedback Shift Register LFSR, Message Digest MD5, and Random number) for each one. After that the encrypted images are applied to Taguchi orthogonal array to measure and calculate the conditional parameters; this method provides the user details of each test. The obtained results of Taguchi experiments proof some facts; secure force cryptographic method is a light weight and provide better image quality as mentioned in several researches; also, jpg images have better image quality parameters for security purposes as proved in several studies. | en_US |
dc.language.iso | en | en_US |
dc.publisher | University of Bahrain | en_US |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Taguchi Method | en_US |
dc.subject | Image Quality | en_US |
dc.subject | Image Encryption | en_US |
dc.subject | Secure Force | en_US |
dc.subject | MD5 | en_US |
dc.subject | AES | en_US |
dc.title | Taguchi Optimization Method for Testing Best Image Encryption Algorithm | en_US |
dc.type | Article | en_US |
dc.identifier.doi | http://dx.doi.org/10.12785/ijcds/090520 | |
dc.volume | 9 | en_US |
dc.issue | 5 | |
dc.pagestart | 1001 | en_US |
dc.pageend | 1008 | en_US |
dc.source.title | International Journal of Computing and Digital Systems | en_US |
dc.abbreviatedsourcetitle | IJCDS | en_US |
The following license files are associated with this item: