Abstract

One popular image security technique is image encryption. This research proposes an image encryption technique that consists of three encryption layers, i.e. bit-shift encryption, chaos-based encryption, and stream encryption. The chaos algorithm used is Arnold's chaotic map, while the stream cipher algorithm used is RC4. Each layer has different cryptology characteristics in order to obtain safer image encryption. The characteristics of cryptology are permutation, confusion, diffusion, and substitution. The combination of the proposed encryption method aims to secure images against various attacks, especially attacks on statistics and differentials. The encryption method testing is done by various measuring instruments such as statistical analysis, i.e. entropy information, avalanche effect, and histogram, differential analysis, i.e. UACI and NPCR, visual analysis using PSNR and SSIM, and bit error ratio. Based on the results of experiments that the encryption method that we propose can work excellently based on various measurement instruments. The decryption process can also work perfectly this is evidenced by the ∞ value based on PSNR, and zero value based on SSIM and BER.

Highlights

  • The development of digital technology has changed the lifestyle of huma ns

  • Cryptographic algorithms that are widely implemented in digital files are AES, DES, RC4, OTP, RSA, and Chaotic Map [4, 5, 8, 10,11,12,13]

  • We propose a combination of three bit-shifting encryption algorithms, chaos and stream ciphers using the RC4 algorithm to produce strong image encryption and resistance to various attacks

Read more

Summary

Introduction

The development of digital technology has changed the lifestyle of huma ns. Storing data manually has been replaced by digital storage, even a few old data been replaced in the form of hard scanned forms of files or digital images. Digital data is used more widely because it can be archived, rediscovered, and trans acted through the internet network. Cryptography is a powerful way to provide security to digital data [4]. Many cryptographic algorithms can be used to secure digital files. Cryptographic algorithms that are widely implemented in digital files are AES, DES, RC4, OTP, RSA, and Chaotic Map [4, 5, 8, 10,11,12,13]. Cryptography in images uses more permutation and diffusion techniques such as chaotic or shifting algorithms [14, 24, 25], this is because methods such as AES, DES and RSA

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.