Wafik, M., Awad, M., AbdElminaam, D. (2022). Secure Image encryption algorithm based on DNA Encoding and Chaos map for cloud computing. Journal of Computing and Communication, 1(2), 9-23. doi: 10.21608/jocc.2022.254986
Menna Allah Wafik; mohamed Awad; Diaa s AbdElminaam. "Secure Image encryption algorithm based on DNA Encoding and Chaos map for cloud computing". Journal of Computing and Communication, 1, 2, 2022, 9-23. doi: 10.21608/jocc.2022.254986
Wafik, M., Awad, M., AbdElminaam, D. (2022). 'Secure Image encryption algorithm based on DNA Encoding and Chaos map for cloud computing', Journal of Computing and Communication, 1(2), pp. 9-23. doi: 10.21608/jocc.2022.254986
Wafik, M., Awad, M., AbdElminaam, D. Secure Image encryption algorithm based on DNA Encoding and Chaos map for cloud computing. Journal of Computing and Communication, 2022; 1(2): 9-23. doi: 10.21608/jocc.2022.254986
Secure Image encryption algorithm based on DNA Encoding and Chaos map for cloud computing
1Information Systems Department, Faculty of Computers and artificial intelligence, Benha University, 12311, Egypt
2Department of Data Science , Faculty of Computer Science , Misr International University , Cairo , Egypt
Abstract
Cloud computing is rapidly expanding in the IT business today, providing a new approach to handling various information systems. The fast advancement of technology necessitates the usage of this technology and reaping its benefits. Understanding and expertise for using algorithmic security in processes and data systems are rising as awareness and concerns about cloud services and information security risks. The major goal of this project is to conduct a security analysis and performance evaluation of a novel lightweight cryptographic method for improving data security in cloud computing. A series of experiments on several test photos were used to verify the efficacy of the suggested technique. Compared to existing schemes, the numerical results show that the suggested algorithm works incredibly well and gives better encryption results despite the larger key sensitivity. Nonetheless, the suggested approach is more resistant to known statistical, differential, and exhaustive attacks.