Page 20 - 2024-Vol20-Issue2
P. 20
16 | Yousif, Hameed & Al-Zuhairi
TABLE IX.
KEY SPACE COMPARISON
Method Key space
Ref. [17] 2213
Ref. [18] 2233
Ref. [19] 2375
Ref. [23] 2325
Ref. [26] 2186
Ref. [27] 2216
Ref. [29] 2398
Ref. [30] 2435
Ref. [33] 2392
Ref. [34]
Ref. [41] 9 × 2528
Ref. [42] 2256
Ref. [44] 2455
Ref. [47] 2239
Proposed 2465
2605
[2] O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. A.-D. an efficient substitution keystream generation strategy,”
Abed, and A. T. Hammid, “Implementation of el-gamal Security and Communication Networks, vol. 2018, pp. 1–
algorithm for speech signals encryption and decryption,” 13, 2018.
Procedia Computer Science, vol. 167, pp. 1028–1037,
2020. [9] A. S. Hameed, “Speech compression and encryption
based on discrete wavelet transform and chaotic sig-
[3] S. F. Yousif, “Encryption and decryption of audio signal nals,” Multimedia Tools and Applications, vol. 80, no. 9,
based on rsa algorithn,” International Journal of Engi- pp. 13663–13676, 2021.
neering Technologies and Management Research, vol. 5,
no. 7, pp. 57–64, 2018. [10] S. F. Yousif, A. J. Abboud, and R. S. Alhumaima, “A new
image encryption based on bit replacing, chaos and dna
[4] S. F. Yousif, “Secure voice cryptography based on diffie- coding techniques,” Multimedia Tools and Applications,
hellman algorithm,” in IOP Conference Series: Materi- vol. 81, no. 19, pp. 27453–27493, 2022.
als Science and Engineering, vol. 1076, p. 012057, IOP
Publishing, 2021. [11] H. N. Abdullah, S. F. Yousif, and A. A. Valenzuela, “Ef-
ficient steganography scheme for color images based
[5] S. F. Yousif, A. J. Abboud, and H. Y. Radhi, “Ro- on wavelets and chaotic maps,” Iraqi Journal of Infor-
bust image encryption with scanning technology, the el- mation and Communication Technology, vol. 2, no. 4,
gamal algorithm and chaos theory,” IEEE Access, vol. 8, pp. 11–20, 2019.
pp. 155184–155209, 2020.
[12] S. F. Yousif, “Speech encryption based on zaslavsky
[6] U. Zia, M. McCartney, B. Scotney, J. Martinez, M. Abu- map,” J. Eng. Appl. Sci, vol. 14, no. 17, pp. 6392–6399,
Tair, J. Memon, and A. Sajjad, “Survey on image encryp- 2019.
tion techniques using chaotic maps in spatial, transform
and spatiotemporal domains,” International Journal of [13] S. F. Yousif, “Grayscale image confusion and diffusion
Information Security, vol. 21, no. 4, pp. 917–935, 2022. based on multiple chaotic maps,” in 2018 1st Interna-
tional scientific conference of engineering sciences-3rd
[7] Z. Tang, Y. Yang, S. Xu, C. Yu, X. Zhang, et al., “Image scientific conference of engineering science (ISCES),
encryption with double spiral scans and chaotic maps,” pp. 114–119, IEEE, 2018.
Security and Communication Networks, vol. 2019, 2019.
[8] C. Fu, G.-y. Zhang, M. Zhu, Z. Chen, and W.-m. Lei, “A [14] S. F. Yousif, “A new speech cryptosystem using dna
new chaos-based color image encryption scheme with encoding, genetic and rsa algorithms,” International