Fractals occupy a rather important and defining place in computer graphics. This is the construction of landscapes, trees, plants, even animals and the generation of fractal textures, as well as fractal image compression. Modern physics and mechanics are just beginning to study the behavior of fractal objects. And of course, fractals are used directly in mathematics itself, as well as in cryptography when protecting images.
The article describes the use of elements of the RSA algorithm in fractal quadratic transformations and systems of fractal transformations for encryption / decryption of monochrome images. Images are one of the most used types of information. Because of this, protecting images from unauthorized use and access is an urgent task. The main condition for creating image protection is the assumption that the image is a stochastic signal. This allows us to transfer classical signal encryption methods to the case of images. But the image is such a signal that, in addition to the typical informativeness of data, also has visual informativeness, which brings new challenges to the protection problems. In fact, creating an attack on an encrypted image is possible in two cases: through traditional hacking of encryption methods, or through methods of visual image processing (methods of extracting contours, filtering, etc.). The latter do not provide a complete reproduction of the input image, but provide an opportunity to obtain some information from the image. In this regard, another requirement is put forward to encryption methods in the case of their use in relation to images – complete noise of the encrypted image. This is necessary in order to prevent the use of visual image processing methods.
Therefore, the urgent task is to develop such a use of the RSA algorithm in order to: preserve the resistance to decryption and ensure full noise of the image in order to make it impossible to use the methods of further visual image processing. One of the ways to solve this problem is to use elements of the RSA algorithm in fractal algorithmic transformations and their systems.
One of the ways to solve this problem is to use elements of the RSA algorithm in mathematical transformations, in particular, in fractal algorithmic transformations.
Fractal transformations can be both linear and quadratic. And also systems of such fractal transformations. Encryption – decryption can be performed both with additional noise and without additional noise.
1. Kovalchuk, A., Izonin, I., Straus, C., & Kustra, N. (2019). Image encryption and decryption schemes using linear and quadratic fractal algorithms and their systems. 1-st International Workshop on Digital Content and Smart Multimedia, DCSMart, 2019. Lviv, Ukraine.
2. Ozkaynak, F., Celik, V., & Ozer, A. B. (2017). A new S-box construction method based on the fractional-order chaotic Chen system. Signal, Image and Video Processing, 11, 659-664. https://doi.org/10.1007/s11760-016-1007-1
https://doi.org/10.1007/s11760-016-1007-1
3. Kovalchuk, A., & Lotoshynska, N. (2018).Elements of RSA Algo-rithm and Extra Noising in a Binary Linear-Quadratic Transfor-mations during Encryption and Decryption of Images. Proceed-ings of the 2018 IEEE 2nd International Conference on Data Stream Mining and Processing, DSMP 2018, 8478471, pp. 542-544. https://doi.org/10.1109/DSMP.2018.8478471
https://doi.org/10.1109/DSMP.2018.8478471
4. Medykovskyy, M., Lipinski, P., Troyan, O., Nazarkevych, M. (2015). Methods of protection document formed from latent ele-ment located by fractals. In 2015 X-th International Scientific and Technical Conference" Computer Sciences and Information Technologies"(CSIT), Lviv, Ukraine. IEEE, 70-72. https://doi.org/10.1109/STC-CSIT.2015.7325434
https://doi.org/10.1109/STC-CSIT.2015.7325434
5. Bruce Schneier. (2003). Applied Cryptography. М.: Triumph, 815 p. [in Russian]
6. Вербіцький, О. В. (1998). Вступ до криптології. Львів: Видав-ництво науково-технічної літератури,247.[in Ukrainian].
7. Kovalchuk, A., & Stupen, M. (2015). Binary linear-quadratic con-version with elements of RSA-algorithm and additional noise in the image protection. (Ser. Computer sciences and information technologies). Bulletin of NU "Lviv Polytechnic", 826,191-196. [in Ukrainian].
8. Rashkevych, Y., Kovalchuk, A., Peleshko, D., & Kupchak, M. (2009). Stream Modification of RSA algorithm for image coding with contour extraction. Proceedings of the X-th International Conference CADSM, 2009. Lviv-Polyana, Ukraine.
9. Wang, J., Zhu, Y., Zhou, C., & Qi, Z. (2020). Construction Method and Performance Analysis of Chaotic S-Box Based on a Memo-rable Simulated Annealing Algorithm. Symmetry, 12, 2115. https://doi.org/10.3390/sym12122115
https://doi.org/10.3390/sym12122115
10. Wagh, D. P., Fadewar, H. S., & Shinde, G. N. (2020). Biometric Finger Vein Recognition Methods for Authentication. In Computing in Engineering and Technology pp. 45-53. https://doi.org/10.1007/978-981-32-9515-5_5
https://doi.org/10.1007/978-981-32-9515-5_5
11. Wikipedia. (2024). Information security. Retrieved from: https://uk.wikipedia.org/wiki/Інформаційна_безпека
12. НД ТЗІ 1.1-003-99. Термінологія в галузі захисту інформації в комп'ютерних системах від несанкціонованого доступу. Re-trieved from: http://www.dstszi.gov.ua/dstszi/doccatalog/document? id=41650