scholarly journals Analytical Study of Hybrid Techniques for Image Encryption and Decryption

Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5162 ◽  
Author(s):  
Chiranji Lal Chowdhary ◽  
Pushpam Virenbhai Patel ◽  
Krupal Jaysukhbhai Kathrotia ◽  
Muhammad Attique ◽  
Kumaresan Perumal ◽  
...  

The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.

Author(s):  
Najlae Falah Hameed Al Saffar ◽  
Inaam R. Al-Saiq ◽  
Rewayda Razaq Mohsin Abo Alsabeh

Asymmetric image encryption schemes have shown high resistance against modern cryptanalysis. Massey Omura scheme is one of the popular asymmetric key cryptosystems based on the hard mathematical problem which is discrete logarithm problem. This system is more secure and efficient since there is no exchange of keys during the protocols of encryption and decryption. Thus, this work tried to use this fact to propose a secure asymmetric image encryption scheme. In this scheme the sender and receiver agree on public parameters, then the scheme begin deal with image using Massey Omura scheme to encrypt it by the sender and then decrypted it by the receiver. The proposed scheme tested using peak signal to noise ratio, and unified average changing intensity to prove that it is fast and has high security.


Author(s):  
Megha D. Randeri ◽  
Dr. Sheshang D. Degadwala ◽  
Mrs. Arpana Mahajan

In recent Era, Security has been most important issue to be considered with different forward looking and preventing measures. Several cryptographic algorithms are developed for encryption and decryption using a secret key. The issue with this strategy is that user ought to recall the key or store the key in a database, which make the framework under danger. Once the put away key is bargained, at that point an attacker can get to the private information effectively. To maintain uniqueness of key, a biometric feature such as fingerprint can be used, whereas randomness can be induced using different combinations of fingerprints. In this paper, we propose a technique to generate the key matrix by extracting minutiae points from the combined minutiae template of fingerprints of the sender and receiver. This system contains four phases. One is Enrolment Phase, second is Authentication Phase, third is Key Generation phase and last is Cryptographic phase. For encryption of the original image using generated key matrix, we use Hill cipher.


Author(s):  
Paavni Gaur

Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14 , for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is an input to AES Encryption to get the encrypted image and then input it to AES Decryption to get the original image is proposed and explained which will further be implemented by me. The paper shows the study in which a system could be used for effective image data encryption and key generation in diversified application areas, where sensitive and confidential data needs to be transmitted along with the image.


2018 ◽  
Vol 7 (4.10) ◽  
pp. 59
Author(s):  
K. Madhusudhan Reddy ◽  
Anirudh Itagi ◽  
Saransh Dabas ◽  
Bonam Kamala Prakash

The Hill Cipher algorithm is a practical algorithm which requires only preliminary knowledge of matrices which makes it quite useful. But, for decrypting the encoded information the key matrix needs to have an inverse (The key matrix needs to be invertible) or else it is impossible to decrypt the given information. The main objective of our paper is to introduce an unorthodox and improved version of Hill Cipher which will make encryption and decryption of an image easier. This paper has diverged from the conventional method by using an orthogonal matrix (where the transpose of a matrix is equal to its inverse) as our key matrix. This method is faster and easier as finding the transpose of a matrix is much simpler than finding the inverse of a given matrix and hence, facilitating the process of faster execution. To further break down the process into an even simpler one, we have added a few more constraints. To show its application, we have used this method to encrypt images using MatLab.  


2021 ◽  
Vol 11 (19) ◽  
pp. 9085
Author(s):  
Kyung-Kyu Ko ◽  
Eun-Sung Jung

Many hacking incidents are linked to work files because most companies work with them. However, a variety of file encryption and decryption methods have been proposed. Existing file encryption/decryption technologies are under threat as hacking technologies advance, necessitating the development of stronger encryption algorithms. Therefore, in this study, we propose a modified advanced encryption standard (AES) algorithm and use quantum computing to encrypt/decrypt AES image files. Because the shift is regular during the AES Shift Row procedure, the change technique led the shift to become irregular when using quantum random walk. Computing resources and speeds were simulated using IBM Qiskit quantum simulators for performance evaluation, whereas encryption performance was assessed using number of pixels change rate (NPCR) and unified average changing intensity (UACI).


Nanophotonics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 2847-2859
Author(s):  
Soojung Kim ◽  
Hyerin Song ◽  
Heesang Ahn ◽  
Seung Won Jun ◽  
Seungchul Kim ◽  
...  

AbstractAnalysing dynamics of a single biomolecule using high-resolution imaging techniques has been had significant attentions to understand complex biological system. Among the many approaches, vertical nanopillar arrays in contact with the inside of cells have been reported as a one of useful imaging applications since an observation volume can be confined down to few-tens nanometre theoretically. However, the nanopillars experimentally are not able to obtain super-resolution imaging because their evanescent waves generate a high optical loss and a low signal-to-noise ratio. Also, conventional nanopillars have a limitation to yield 3D information because they do not concern field localization in z-axis. Here, we developed novel hybrid nanopillar arrays (HNPs) that consist of SiO2 nanopillars terminated with gold nanodisks, allowing extreme light localization. The electromagnetic field profiles of HNPs are obtained through simulations and imaging resolution of cell membrane and biomolecules in living cells are tested using one-photon and 3D multiphoton fluorescence microscopy, respectively. Consequently, HNPs present approximately 25 times enhanced intensity compared to controls and obtained an axial and lateral resolution of 110 and 210 nm of the intensities of fluorophores conjugated with biomolecules transported in living cells. These structures can be a great platform to analyse complex intracellular environment.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 535
Author(s):  
Karim H. Moussa ◽  
Ahmed I. El Naggary ◽  
Heba G. Mohamed

Multimedia wireless communications have rapidly developed over the years. Accordingly, an increasing demand for more secured media transmission is required to protect multimedia contents. Image encryption schemes have been proposed over the years, but the most secure and reliable schemes are those based on chaotic maps, due to the intrinsic features in such kinds of multimedia contents regarding the pixels’ high correlation and data handling capabilities. The novel proposed encryption algorithm introduced in this article is based on a 3D hopping chaotic map instead of fixed chaotic logistic maps. The non-linearity behavior of the proposed algorithm, in terms of both position permutation and value transformation, results in a more secured encryption algorithm due to its non-convergence, non-periodicity, and sensitivity to the applied initial conditions. Several statistical and analytical tests such as entropy, correlation, key sensitivity, key space, peak signal-to-noise ratio, noise attacks, number of pixels changing rate (NPCR), unified average change intensity randomness (UACI), and others tests were applied to measure the strength of the proposed encryption scheme. The obtained results prove that the proposed scheme is very robust against different cryptography attacks compared to similar encryption schemes.


Sign in / Sign up

Export Citation Format

Share Document