Image Encryption Performance Analysis Using Reversible Logic Gates
Khalid Kadhim Jabbar, Fahmi Ghozzi, Ahmed Fakhfakh
DOI: https://doi.org/10.47831/mjpas.v2i1.102
Keywords: Information security, WWW, Logic gate, RLG, Encryption.Article history:Received: Received in revised format: Accepted Available online.
Abstract
Information security is one of the important sciences that need great attention from professionals in this field because of the growing need to use the WWW (World Wide Web) and the growing human connection with it. It is urgent to take advantage of the services that are provided through the network. With this in mind, we set out to review and compare several new papers examining the use of RLG (Reversible Logic Gates) to encode images. Due to the fact that attempts in this field are few compared to multiple attempts in other fields, we highlighted eight studies published between 2013 and 2022, we compared this studies and our analysis consider a wide range of factors, including but not limited to the encryption technology, logic gates used, image size, key length, portable data volume and security analysis.
The results that mentioned in the tables show that most businesses use common encryption algorithms with some traditional additions that make the systems more efficient and innovative. This is especially true for systems that use reversible logic gates to encrypt data based on chaotic permutations, difference equations, and other methods. The comparison also shows the downsides and trade-offs of each method, such as how increasing the size of an image affects the time it takes to encrypt it and how important it is to find a balance between security and performance. Overall, the study provides useful information in the field of image coding using inverse logic gates and suggests possible directions for future work.