scholarly journals An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images

2019 ◽  
Vol 9 (3) ◽  
pp. 4165-4168 ◽  
Author(s):  
M. O. Al-Dwairi ◽  
A. Y. Hendi ◽  
Z. A. AlQadi

Digital color images are considered as the most widely used data. They are exchanged frequently on the internet and via email, so an efficient and highly secure method of color image encryption and decryption is needed. Different methods of encryption-decryption are used, but most of them suffer from low efficiency or low-security level or both. In this paper, an efficient and highly secure method of encryption-decryption will be proposed, tested, and implemented. The efficiency parameters will be calculated and compared with other methods’ parameters to prove the efficiency of the proposed method.

2018 ◽  
Vol 7 (3.13) ◽  
pp. 104 ◽  
Author(s):  
Musbah J. Aqel ◽  
Ziad ALQadi ◽  
Ammar Ahmed Abdullah

Digital RGB color images are considered as the most widely used data type through the internet, so there is a need for efficient and secure techniques to transmit and protect these digital images and this is a matter of high priority process. Many researchers had developed different techniques to increase the security of image transmission, and most of these techniques suffer from the low speed of the encryption-decryption process. In this paper, a novel technique is proposed that could be used for digital color image encryption-decryption. The performance of this technique is compared with the performance of other techniques and it has shown the advantages of using this technique over other techniques in enhancing the throughput and speed of encryption-decryption process. 


Author(s):  
Mohamad Tariq Barakat ◽  
Rushdi Abu Zneit ◽  
Ziad A. Alqadi

Multiple methods are used to hide secret messages in digital color images, and the most important and most common is the least significant bit (LSB) method. The LSB method is a known and exposed method, and anyone with programming experience can retrieve the secret message embedded in the digital image. In this paper research we will add some enhancements to improve the security level of LSB method to protect the embedded secret message from being hacked. A simple method of secret message cryptography will be used to encrypt the secret message before bedding it using LSB method. The method will be based on using color image as an image_key; this image_key will be resized to generate the needed secret private key used to encrypt-decrypt secret message. The length and the contents of the generated private key will dynamically change depending on the message length and the selected image_key. The selected image_key will be kept in secret without transmission and will be known only by the sender and receiver and it can be changed any time when needed. The proposed crypto_steganographic method will be implemented to show how it will increase the level o secret message protection.


2019 ◽  
Vol 8 (4) ◽  
pp. 2797-2800

visual cryptography system proposed a image encryption and decryption method. In the proposed method Red, Green, Blue color images using visual cryptography. In existing system is working for share created, it is encrypted separately by using visual secret share creation (VSS) algorithms. The proposed work is original images share1 and ahare2 created XOR-Based visual cryptography. This proposed schemes share1 encryption and share2 encryption included in RSA algorithm. The share1 and ahare2 decryption process is enable secret image sharing and then stacking. The proposed system is value calculate the PSNR and MSE formula and then image security using NPCR and UACI formula. The visual cryptography existing work to compare the proposed work and better results quality of RGB color images. The color image encryption and decryption using RSA algorithm and matlab coding.


2015 ◽  
Vol 7 (1) ◽  
pp. 29-49
Author(s):  
Hoang Xuan Thanh ◽  
Thang Manh Hoang

We present the security weakness of encryption algorithm in the form of substitution-permutation network with multiple rounds of permutation and single round of diffusion proposed by W. Zhang et al. The types of chosen-plaintext and chosen-ciphertext attacks are successful against the cryptosystem, and the equivalent versions of keys for encryption and decryption are restored. The security analysis suggests that encryption using substitution-permutation network must be executed more than one encryption round to ensure the security. Our specific examples will demonstrate the cryptanalysis.


2014 ◽  
Vol 24 (04) ◽  
pp. 1450049 ◽  
Author(s):  
Hanzhong Zheng ◽  
Simin Yu ◽  
Jinhu Lü

In this paper, discrete-time chaotic systems under single state variable feedback control are studied, and drive-response synchronization is investigated. To that end, ARM platform-based digital color image encryption and decryption using a chaotic stream cipher is designed and implemented, with experimental results demonstrated.


IJARCCE ◽  
2020 ◽  
Vol 9 (5) ◽  
pp. 1-7
Author(s):  
Prof. Yousif Eltous ◽  
Dr. Akram Moustafa Hamarch ◽  
Dr. Mohammad S. Khrisat

Sign in / Sign up

Export Citation Format

Share Document