University of Bahrain
Scientific Journals

Image Encryption using a Binary Search Tree Structure-Based Key

Show simple item record

dc.contributor.author Abbas Fadhil Al-Husainy, Mohammed
dc.contributor.author A. A. Al-Sewadi, Hamza
dc.contributor.author Al-Shargabi, Bassam
dc.date.accessioned 2021-08-22T23:40:58Z
dc.date.available 2021-08-22T23:40:58Z
dc.date.issued 2021-08-23
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/4502
dc.description.abstract Due to the ever-increasing cybercrime and hazards on digital information stored or in transit over computer clouds and networks, so many encryption algorithms were developed and practically implemented. On the other hand, hackers and intruders keep on developing methods to break those algorithms. Hence, new methods are always sought and developed by researchers. A binary search tree (BST) is implemented in this paper to produce a new algorithm for image encryption. The BST is utilized to generate an encryption key that consists of two parts; local and global with flexible length capabilities that provide better security. Sharing all image contents to encrypt any byte of the source image helped to achieve Shannon’s concept of diffusion and confusion. The experimental application of this algorithm has manifested a satisfactory security performance as compared with the widely used cryptographic systems such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES). These Comparisons included measurement of encryption time complexity, Peak Signal to Noise Ratio (PSNR), Entropy, encryption key space. Besides, the new method offers encryption key length flexibility and involvement of all image contents in its generation. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/4.0/ *
dc.subject Image-encryption en_US
dc.subject Data-security en_US
dc.subject Cryptography en_US
dc.subject Avalanche-effect en_US
dc.subject Binary search tree en_US
dc.title Image Encryption using a Binary Search Tree Structure-Based Key en_US
dc.identifier.doi https://dx.doi.org/10.12785/ijcds/120168
dc.contributor.authorcountry Iraq en_US
dc.contributor.authorcountry Iraq en_US
dc.contributor.authorcountry Amman-Jordan en_US
dc.contributor.authoraffiliation Iraq University College, Basrah en_US
dc.contributor.authoraffiliation Iraq University College, Basrah en_US
dc.contributor.authoraffiliation Middle East University en_US
dc.source.title International Journal Of Computing and Digital System en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Issue(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 International Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International

All Journals


Advanced Search

Browse

Administrator Account