Papers by Mohammad Soltani
Image applications have been increasing in recent years. Encryption is used to provide the securi... more Image applications have been increasing in recent years. Encryption is used to provide the security needed for image
applications. There are many image encryption schemes have been proposed, each one of them has its strength and weakness.
In this paper I suggested a new, secure and robust cryptography algorithm to prevent unauthorized access to contents of
encrypted images. The main features of cryptography algorithm defined in this article are logical cryptography and visual
cryptography together, the ability to encrypt the secret image in successive stages, changing the physical structure of the
secret image, no limitation for the number of keys, using logical operation, creating six keys, Interdependence of all keys in
all stages of encrypting and decrypting, bigger changes in the physical structure of the encrypted image In case of wrong
decryption and to make the resulting keys and encrypted image unique after the cryptography process.
Text Road, Journal of Basic and Applied Scientific Research (JBASR), Jul 21, 2013
"In the digital world, which is currently evolving and changing at such a rapid pace, the securit... more "In the digital world, which is currently evolving and changing at such a rapid pace, the security of digital
information has become increasingly more important. Great development of secret contact and communication in
the world, the necessity of communication security is becoming more and more significant. Cryptography has
specific role to protect secret files like secret documents from unauthorized access. Cryptography algorithms are
classified in to two types, Public-key producing and symmetric-key producing algorithms. In this paper, I suggested
a new robust cryptography algorithm to increase security in the Symmetric-key producing algorithm. The main
features of cryptography algorithm defined in this article are the ability to encrypt the secret file in successive stages,
changing the physical structure of the secret file, no limitation for the number of keys, Creating five keys at each
stage of cryptography, storing a part of secret file at one of the keys at each stage of cryptography, Interdependence
of all keys in all stages of encrypting and decrypting, To make the keys interdependent and to encrypt the secret file
by each of them, there are 2 independent algorithms to select the type of algorithm needed to make the keys
interdependent by the user, bigger changes in the physical structure of the encrypted file In case of wrong decryption
and to make the resulting keys and encrypted file unique after the cryptography process."
Cryptography has specific role to protect secret file from
unauthorized access. Cryptography alg... more Cryptography has specific role to protect secret file from
unauthorized access. Cryptography algorithms are classified in to
two types, Symmetric-key producing and Public-key producing
algorithms. In this paper, suggested a new cryptography
algorithm to increase security in the Symmetric-key producing
algorithm. The main features of cryptography algorithm defined
in this article are Changing the physical structure of the secret
file, no limitation for the number of keys, The ability to encrypt
the secret file in successive stages, Creating five keys at each
stage of cryptography, storing a part of secret file at one of the
keys at each stage of cryptography, Interdependence of all keys
in all stages of encrypting and decrypting, To make the keys
interdependent and to encrypt the secret file by each of them,
there are 3 independent algorithms to select the type of algorithm
needed to make the keys interdependent by the user, bigger
changes in the physical structure of the encrypted file In case of
wrong decryption and to make the resulting keys and encrypted
file unique after the cryptography process.
Uploads
Papers by Mohammad Soltani
applications. There are many image encryption schemes have been proposed, each one of them has its strength and weakness.
In this paper I suggested a new, secure and robust cryptography algorithm to prevent unauthorized access to contents of
encrypted images. The main features of cryptography algorithm defined in this article are logical cryptography and visual
cryptography together, the ability to encrypt the secret image in successive stages, changing the physical structure of the
secret image, no limitation for the number of keys, using logical operation, creating six keys, Interdependence of all keys in
all stages of encrypting and decrypting, bigger changes in the physical structure of the encrypted image In case of wrong
decryption and to make the resulting keys and encrypted image unique after the cryptography process.
information has become increasingly more important. Great development of secret contact and communication in
the world, the necessity of communication security is becoming more and more significant. Cryptography has
specific role to protect secret files like secret documents from unauthorized access. Cryptography algorithms are
classified in to two types, Public-key producing and symmetric-key producing algorithms. In this paper, I suggested
a new robust cryptography algorithm to increase security in the Symmetric-key producing algorithm. The main
features of cryptography algorithm defined in this article are the ability to encrypt the secret file in successive stages,
changing the physical structure of the secret file, no limitation for the number of keys, Creating five keys at each
stage of cryptography, storing a part of secret file at one of the keys at each stage of cryptography, Interdependence
of all keys in all stages of encrypting and decrypting, To make the keys interdependent and to encrypt the secret file
by each of them, there are 2 independent algorithms to select the type of algorithm needed to make the keys
interdependent by the user, bigger changes in the physical structure of the encrypted file In case of wrong decryption
and to make the resulting keys and encrypted file unique after the cryptography process."
unauthorized access. Cryptography algorithms are classified in to
two types, Symmetric-key producing and Public-key producing
algorithms. In this paper, suggested a new cryptography
algorithm to increase security in the Symmetric-key producing
algorithm. The main features of cryptography algorithm defined
in this article are Changing the physical structure of the secret
file, no limitation for the number of keys, The ability to encrypt
the secret file in successive stages, Creating five keys at each
stage of cryptography, storing a part of secret file at one of the
keys at each stage of cryptography, Interdependence of all keys
in all stages of encrypting and decrypting, To make the keys
interdependent and to encrypt the secret file by each of them,
there are 3 independent algorithms to select the type of algorithm
needed to make the keys interdependent by the user, bigger
changes in the physical structure of the encrypted file In case of
wrong decryption and to make the resulting keys and encrypted
file unique after the cryptography process.
applications. There are many image encryption schemes have been proposed, each one of them has its strength and weakness.
In this paper I suggested a new, secure and robust cryptography algorithm to prevent unauthorized access to contents of
encrypted images. The main features of cryptography algorithm defined in this article are logical cryptography and visual
cryptography together, the ability to encrypt the secret image in successive stages, changing the physical structure of the
secret image, no limitation for the number of keys, using logical operation, creating six keys, Interdependence of all keys in
all stages of encrypting and decrypting, bigger changes in the physical structure of the encrypted image In case of wrong
decryption and to make the resulting keys and encrypted image unique after the cryptography process.
information has become increasingly more important. Great development of secret contact and communication in
the world, the necessity of communication security is becoming more and more significant. Cryptography has
specific role to protect secret files like secret documents from unauthorized access. Cryptography algorithms are
classified in to two types, Public-key producing and symmetric-key producing algorithms. In this paper, I suggested
a new robust cryptography algorithm to increase security in the Symmetric-key producing algorithm. The main
features of cryptography algorithm defined in this article are the ability to encrypt the secret file in successive stages,
changing the physical structure of the secret file, no limitation for the number of keys, Creating five keys at each
stage of cryptography, storing a part of secret file at one of the keys at each stage of cryptography, Interdependence
of all keys in all stages of encrypting and decrypting, To make the keys interdependent and to encrypt the secret file
by each of them, there are 2 independent algorithms to select the type of algorithm needed to make the keys
interdependent by the user, bigger changes in the physical structure of the encrypted file In case of wrong decryption
and to make the resulting keys and encrypted file unique after the cryptography process."
unauthorized access. Cryptography algorithms are classified in to
two types, Symmetric-key producing and Public-key producing
algorithms. In this paper, suggested a new cryptography
algorithm to increase security in the Symmetric-key producing
algorithm. The main features of cryptography algorithm defined
in this article are Changing the physical structure of the secret
file, no limitation for the number of keys, The ability to encrypt
the secret file in successive stages, Creating five keys at each
stage of cryptography, storing a part of secret file at one of the
keys at each stage of cryptography, Interdependence of all keys
in all stages of encrypting and decrypting, To make the keys
interdependent and to encrypt the secret file by each of them,
there are 3 independent algorithms to select the type of algorithm
needed to make the keys interdependent by the user, bigger
changes in the physical structure of the encrypted file In case of
wrong decryption and to make the resulting keys and encrypted
file unique after the cryptography process.