Next Article in Journal
A COP Prediction Model of Hybrid Geothermal Heat Pump Systems based on ANN and SVM with Hyper-Parameters Optimization
Previous Article in Journal
Non-Destructive Testing in Concrete Maturity Modeling and Master Curve Development
 
 
Article
Peer-Review Record

Hybrid Chaotic-Based PRNG for Secure Cryptography Applications

Appl. Sci. 2023, 13(13), 7768; https://doi.org/10.3390/app13137768
by Abdullah M. Alnajim 1, Ehab Abou-Bakr 2,3, Sarah S. Alruwisan 4, Sheroz Khan 5,* and Rania A. Elmanfaloty 6,7,*
Reviewer 1:
Reviewer 2:
Reviewer 3:
Appl. Sci. 2023, 13(13), 7768; https://doi.org/10.3390/app13137768
Submission received: 17 April 2023 / Revised: 20 June 2023 / Accepted: 25 June 2023 / Published: 30 June 2023
(This article belongs to the Section Computing and Artificial Intelligence)

Round 1

Reviewer 1 Report

Some comments as: 

  1. Please improve the abstract to point better to the scientific contribution and novelty of the proposal and insert already the quantitative data that demonstrate the benefits of your approach

  1. Improve the introduction section to point better to the related works. Not only necessary to mention similar research. It is required to mention why your approach is different and explain from other research what is your scientific contribution and how you are going beyond state-of-the-art.  

  1. The contribution of the paper is not clear. Most of the outcomes of these papers are expected based on the previous studies, but where is the contribution of this paper? 

  1. To make the proposed algorithm of this article more readable use pseudo-code.  

  1. Decryption algorithm of the suggested cryptosystem is not stated.  

  1. In simulation results, the utilized initial conditions and control parameters need to be illustrated.

  1. Where is the utilized dataset of images taken from?  

  1. The key sensitivity is needed to be tested in quantity. 

  1. In addition to histogram analysis, the chi-square test can be performed to validate the results statistically.  

  1. Improve the quality of the figures and explain those properly.  

  1. NPCR is a simplification for "Number of Pixels Change Rate", not "Net Pixel Change Rate". 

  1. Time complexity analysis for image cryptosystem is not stated.  

  1. Add future work in the conclusion section.

Author Response

Authors response is enclsoed.

Author Response File: Author Response.pdf

Reviewer 2 Report

                                                         

  1. The keyspace in this article is small compared to other similar articles.                                            
  2. Please compare the keyspace with similar articles.                                                                             
  3. This paper does not perform key-sensitivity analysis and analysis against differential and noise attacks.                                                                                                                                                       
  4. To publish this article, the author must give a convincing reason for choosing his simple proposed algorithm.                                                                                                                     
  5. For the present study's accuracy, comparing the values in the tables with newer references should be corrected.                                                                                                             
  6. In section 3.1, three sentences with the same meaning have been used, which are unnecessary.        
  7.  In the results section of line 370, alpha values should be corrected.                                                  
  8.  In line 355, 27 gray images have written, and in the results section, in line 372, 28 images are wrongly written.                                                                                                                              

                                                       

  1.       This manuscript must be corrected in terms of grammar.           

Author Response

Authors response is enclosed

Author Response File: Author Response.pdf

Reviewer 3 Report

Please, see the attachment.

Comments for author File: Comments.pdf

Minor editing of English language required.

Author Response

Authors response is enclosed

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

This work should be revised well again as there are many mistakes in terms of: -  

1) In the abstract, insert the quantitative data demonstrating your approach's benefits. 

2) Are bird, lion, pyramids, and sphinx images belonging to the SIPI database? 

3) The related works session needs to be included. It is not only necessary to mention similar research. It is necessary to mention why your approach is different and explain from other research what is your scientific contribution and how you are going beyond the state of the art.  

4) The key sensitivity needs to be tested in quantity not visually, using NPCR between the decrypted image with the correct key and the decrypted images with the modified key.

 

Author Response

Response Review#1 is enclosed

Author Response File: Author Response.pdf

Reviewer 2 Report

The authors were able to give appropriate answers to the referees' questions and improve the quality of the article.

It is possible to improve the text.

Author Response

Response Review#2 is enclosed

Author Response File: Author Response.pdf

Reviewer 3 Report

All my concerns have been addressed in the revision. Therefore, I'm giving my recommendation for acceptance of the manuscript.

Author Response

Response Review#3 is enclosed

Author Response File: Author Response.pdf

Round 3

Reviewer 1 Report

The previous comments have been addressed.

 

Back to TopTop