Author
Listed:
- Mohammad Mazyad Hazzazi
(Department of Mathematics, College of Science, King Khalid University, Abha 61421, Saudi Arabia)
- Raja Rao Budaraju
(Senior Member of Technical Staff, Oracle, 3990 Scottfield Street, Dublin, CA 94568, USA)
- Zaid Bassfar
(Department of Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia)
- Ashwag Albakri
(Department of Computer Science, College of Computer Science & Information Technology, Jazan 45142, Saudi Arabia)
- Sanjay Mishra
(Department of USCS, Uttaranchal University, Dehradun 248007, India)
Abstract
With the advent of several new means of communication, safeguarding the confidentiality of messages has become more crucial. Financial institutions, virtual currencies, and government organizations are all examples of high-risk contexts where information exchanges need particular care. The importance of data security in preventing unauthorized access to data is emphasized. Several cryptographic methods for protecting the secrecy and integrity of data were compared. In this research, the proposed work includes a new Turbo Code-based encryption algorithm. The Turbo encoder’s puncturing process is controlled by a secret key, and a typical random sequence is generated to encrypt the data and fix any mistakes. Key generation utilizing pre-existing data eliminates the requirement for sending keys over a secure channel. Using recurrence relations and the Lower–Upper (LU) decomposition method, the presented study suggests a novel approach to message encryption and decryption. The resulting encrypted grayscale image has a very high level of security, with an entropy of 7.999, a variation from perfection of 0.0245, and a correlation of 0.0092 along the diagonal, 0.0009 along the horizontal, and −0.0015 along the vertical. Directly decrypted pictures have a Peak Signal-to-Noise Ratio (PSNR) of 56.22 dB, but the suggested approach only manages an embedding capacity of 0.5 bpp (bits per pixel). This may be achieved by decreasing the size of the location map by only 0.02 bpp.
Suggested Citation
Mohammad Mazyad Hazzazi & Raja Rao Budaraju & Zaid Bassfar & Ashwag Albakri & Sanjay Mishra, 2023.
"A Finite State Machine-Based Improved Cryptographic Technique,"
Mathematics, MDPI, vol. 11(10), pages 1-25, May.
Handle:
RePEc:gam:jmathe:v:11:y:2023:i:10:p:2225-:d:1142837
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:10:p:2225-:d:1142837. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.