Abstract

In this paper, we propose an efficient cryptosystem for digital image encryption and authentication. The cryptosystem is a hybrid scheme that uses symmetric and asymmetric approaches. The first one is used to encrypt the host image by utilizing a chaos-based key generator. The second one is used to encrypt the initial secret key and the owner’s signature that permit authentication. The algorithm is evaluated and validated by its application on several types of standard images and tools such as the statistical analysis, the key, and the performance analysis. The results indicate that the proposed cryptosystem provides high performance and enhanced security. The NIST 800-22 is used for testing the pseudorandom numbers generation (PRNG). The obtained simulation results are better than those cited in the recent works in terms of execution time and security level and low computational complexity.

Highlights

  • Our life today has voracious requirements for advanced technology that can store, find, transfer, process, serve, and communicate data and information around the world. e liberty of access to the public networks by anyone has increased the shrewdness of spying, hacking, falsification, illegal copy, and utilization of digital multimedia documents, intellectual property, personal identities, and sensitive information such as images

  • According to the results presented in references 1 and 2, we notice that the encryption systems based on the Advanced Encryption System (AES) algorithm cause a long execution time [5]. is disadvantage affects, directly, the global quality of the system in case of online encryption

  • Statistical analysis is the computation of the similarity factor between the original and its corresponding encrypted image in the goal to evaluate the ability of information in defending hackers. is is can be achieved using the image histogram, information Entropy (E), Normalized Correlation (NC), correlation coefficient (ρ), Peak Signal to Noise Ratio (PSNR), and Structural Similarity Index Measure (SSIM) tools [18,19,20]

Read more

Summary

Introduction

Our life today has voracious requirements for advanced technology that can store, find, transfer, process, serve, and communicate data and information around the world. e liberty of access to the public networks by anyone has increased the shrewdness of spying, hacking, falsification, illegal copy, and utilization of digital multimedia documents, intellectual property, personal identities, and sensitive information such as images. E symmetric encryption is more popular because it is generally hundreds to thousands of execution times faster than asymmetric schemes. There are two encryption schemes: symmetric and asymmetric encryption. It uses closely related identical keys for encryption, and for decryption steps, unlike an asymmetric scheme, it utilizes a different key for encryption than for decryption. Us, when knowing the encryption key of a key pair, we can encrypt data, but we cannot decrypt it; the asymmetric encryption is more secure than the symmetric encryption. The symmetric encryption is intended for large volume data encryption, while the asymmetric encryption is frequently used for securely exchanging a secret key. The elliptic curves are used for generating three random sequences. ese sequences are used for generating three masks in the goal to encrypt the red, blue, and green components of the original image

Journal of Electrical and Computer Engineering
Encrypted Key
Owner logo Authentication
Lena Peppers Baboon Walkbridge Cameraman Jetplane
Plain Cipher
Encrypted Lena
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.