Page 20 - 2024-Vol20-Issue2
P. 20

16 |                                                                      Yousif, Hameed & Al-Zuhairi

               TABLE IX.
      KEY SPACE COMPARISON

      Method                                                   Key space
      Ref. [17]                                                   2213
      Ref. [18]                                                   2233
      Ref. [19]                                                   2375
      Ref. [23]                                                   2325
      Ref. [26]                                                   2186
      Ref. [27]                                                   2216
      Ref. [29]                                                   2398
      Ref. [30]                                                   2435
      Ref. [33]                                                   2392
      Ref. [34]
      Ref. [41]                                                 9 × 2528
      Ref. [42]                                                   2256
      Ref. [44]                                                   2455
      Ref. [47]                                                   2239
      Proposed                                                    2465
                                                                  2605

[2] O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. A.-D.             an efficient substitution keystream generation strategy,”
    Abed, and A. T. Hammid, “Implementation of el-gamal              Security and Communication Networks, vol. 2018, pp. 1–
     algorithm for speech signals encryption and decryption,”        13, 2018.
    Procedia Computer Science, vol. 167, pp. 1028–1037,
     2020.                                                      [9] A. S. Hameed, “Speech compression and encryption
                                                                     based on discrete wavelet transform and chaotic sig-
[3] S. F. Yousif, “Encryption and decryption of audio signal         nals,” Multimedia Tools and Applications, vol. 80, no. 9,
     based on rsa algorithn,” International Journal of Engi-         pp. 13663–13676, 2021.
     neering Technologies and Management Research, vol. 5,
     no. 7, pp. 57–64, 2018.                                   [10] S. F. Yousif, A. J. Abboud, and R. S. Alhumaima, “A new
                                                                     image encryption based on bit replacing, chaos and dna
[4] S. F. Yousif, “Secure voice cryptography based on diffie-        coding techniques,” Multimedia Tools and Applications,
     hellman algorithm,” in IOP Conference Series: Materi-           vol. 81, no. 19, pp. 27453–27493, 2022.
     als Science and Engineering, vol. 1076, p. 012057, IOP
     Publishing, 2021.                                         [11] H. N. Abdullah, S. F. Yousif, and A. A. Valenzuela, “Ef-
                                                                     ficient steganography scheme for color images based
[5] S. F. Yousif, A. J. Abboud, and H. Y. Radhi, “Ro-                on wavelets and chaotic maps,” Iraqi Journal of Infor-
     bust image encryption with scanning technology, the el-         mation and Communication Technology, vol. 2, no. 4,
     gamal algorithm and chaos theory,” IEEE Access, vol. 8,         pp. 11–20, 2019.
     pp. 155184–155209, 2020.
                                                               [12] S. F. Yousif, “Speech encryption based on zaslavsky
[6] U. Zia, M. McCartney, B. Scotney, J. Martinez, M. Abu-           map,” J. Eng. Appl. Sci, vol. 14, no. 17, pp. 6392–6399,
    Tair, J. Memon, and A. Sajjad, “Survey on image encryp-          2019.
     tion techniques using chaotic maps in spatial, transform
     and spatiotemporal domains,” International Journal of     [13] S. F. Yousif, “Grayscale image confusion and diffusion
    Information Security, vol. 21, no. 4, pp. 917–935, 2022.         based on multiple chaotic maps,” in 2018 1st Interna-
                                                                     tional scientific conference of engineering sciences-3rd
[7] Z. Tang, Y. Yang, S. Xu, C. Yu, X. Zhang, et al., “Image         scientific conference of engineering science (ISCES),
     encryption with double spiral scans and chaotic maps,”          pp. 114–119, IEEE, 2018.
    Security and Communication Networks, vol. 2019, 2019.

[8] C. Fu, G.-y. Zhang, M. Zhu, Z. Chen, and W.-m. Lei, “A [14] S. F. Yousif, “A new speech cryptosystem using dna

new chaos-based color image encryption scheme with             encoding, genetic and rsa algorithms,” International
   15   16   17   18   19   20   21   22   23   24   25