(Publisher of Peer Reviewed Open Access Journals)

ACCENTS Transactions on Information Security (TIS)

ISSN (Print):XXXX    ISSN (Online):2455-7196
Volume-6 Issue-23 July-2021
Full-Text PDF
Paper Title : An improve image security algorithm using hybrid cryptography approach
Author Name : Shubham Shashikant Patil, Kailash Patidar, Gourav Saxena and Narendra Sharma
Abstract :

This paper explores the image data security concepts along with the experimentation. An efficient combination of RC4-RC6 with Blowfish (RC2 (46B)) algorithm has been applied for the image data encryption. Wang database has been considered for the experimentation. It consists of 1,000 test images. In this approach image was selected from the database. Then image data preprocessing has been performed and matrix values have been obtained for the further processing. Then substitution was performed based on RC2 (46B). This substitution is efficient as it provides the best selection from the combination of the RC6 and RC4. Then the blowfish algorithm was applied after the substitution and first key generation. XOR was performed on the obtained bit. So that the maximum place value replacements were performed successfully. Then reverse mechanisms were adopted for the decryption of the data and finally the original image has been recovered. The results clearly depict that the performance of the proposed framework is better as the error rates are less or minor. It indicates the average error rate of 0.15. In terms of average time for encryption and decryption is 92 ms. The loss in terms of image pixels is also minimized as the error rate variation found from the images are minor. So, it is also efficient in terms of information entropy.

Keywords : Image data security, Unauthorized access, Cryptography, Steganography.
Cite this article : Patil SS, Patidar K, Saxena G, Sharma N. An improve image security algorithm using hybrid cryptography approach. ACCENTS Transactions on Information Security. 2021; 6 (23): 13-19. DOI:10.19101/TIS.2021.621006.
References :
[1]Kocarev L. Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine. 2001; 1(3):6-21.
[Crossref] [Google Scholar]
[2]Sasubilli SM, Dubey AK, Kumar A. Hybrid security analysis based on intelligent adaptive learning in Big Data. In International Conference on Advances in Computing and Communication Engineering 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[3]Qiu J, Wang P. An image encryption and authentication scheme. In International Conference on Computational Intelligence and Security 2011 (pp. 784-7). IEEE.
[Crossref] [Google Scholar]
[4]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In International Conference on Advances in Computing and Communication Engineering 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[5]Hu G, Feng Z, Wang L. Analysis of a type of digital chaotic cryptosystem. In International Symposium on Circuits and Systems. Proceedings 2002 (Vol. 3, pp. III-I). IEEE.
[Crossref] [Google Scholar]
[6]Boiko J, Kovtun I, Petrashchuk S. Productivity of telecommunication systems with modified signal-code constructions. In International Scientific-Practical Conference Problems of Infocommunications. Science and Technology 2017 (pp. 173-8). IEEE.
[Crossref] [Google Scholar]
[7]Millérioux G, Amigó JM, Daafouz J. A connection between chaotic and conventional cryptography. IEEE Transactions on Circuits and Systems I: Regular Papers. 2008; 55(6):1695-703.
[Crossref] [Google Scholar]
[8]Zahan A, Hossain MS, Rahman Z, Shezan SK. Smart home IoT use case with elliptic curve based digital signature: an evaluation on security and performance analysis. International Journal of Advanced Technology and Engineering Exploration. 2020;7(62):11-9.
[Crossref] [Google Scholar]
[9]Ni Z, Shi YQ, Ansari N, Su W. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology. 2006; 16(3):354-62.
[Crossref] [Google Scholar]
[10]Nazmudeen NH, Farsana FJ. Satellite image security improvement by combining DWT-DCT watermarking and AES encryption. International Journal of Advanced Computer Research. 2014; 4(2):645-52.
[Google Scholar]
[11]Seethalakshmi AV, Hemachitra HS. Complex type seed variety identification and recognition using optimized image processing techniques. ACCENTS Transactions on Image Processing and Computer Vision. 2020; 6 (19): 23-31.
[Crossref] [Google Scholar]
[12]Gladwin SJ, Gowthami PL. Combined cryptography and steganography for enhanced security in suboptimal images. In International Conference on Artificial Intelligence and Signal Processing 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[13]Al-Kadei FH, Mardan HA, Minas NA. Speed up image encryption by using RSA algorithm. In international conference on advanced computing and communication systems 2020 (pp. 1302-7). IEEE.
[Crossref] [Google Scholar]
[14]Duan X, Guo D, Liu N, Li B, Gou M, Qin C. A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access. 2020; 8:25777-88.
[Crossref] [Google Scholar]
[15]Dubey AK, Dubey AK, Namdev M, Shrivastava SS. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. In CSI international conference on software engineering 2012 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[16]Sharma V, Shukla M, Srivastava S, Mandal R. Generative network based image encryption. In International Conference on Intelligent Computing and Control Systems 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[17]Abhinav A, Manikandan VM, Bini AA. An improved reversible data hiding on encrypted images by selective pixel flipping technique. In international conference on devices, circuits and systems 2020 (pp. 294-8). IEEE.
[Crossref] [Google Scholar]
[18]Santos TA, Magalhães EP, Basílio NP, Nepomuceno EG, Karimov TI, Butusov DN. Improving chaotic image encryption using maps with small Lyapunov exponents. In Moscow workshop on electronic and networking technologies 2020 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[19]Hu D, Zheng Y, Zhang H, Sun S, Xie F, Shi J, Jiang Z. Informative retrieval framework for histopathology whole slides images based on deep hashing network. In international symposium on biomedical imaging 2020 (pp. 244-8). IEEE.
[Crossref] [Google Scholar]
[20]Yadahalli SS, Rege S, Sonkusare R. Implementation and analysis of image steganography using least significant bit and discrete wavelet transform techniques. In international conference on communication and electronics systems 2020 (pp. 1325-30). IEEE.
[Crossref] [Google Scholar]
[21]Kalaichelvi T, Apuroop P. Image steganography method to achieve confidentiality using CAPTCHA for authentication. In international conference on communication and electronics systems 2020 (pp. 495-9). IEEE.
[Crossref] [Google Scholar]
[22]Ye H, Huang S, Liu W. Research on image scrambling method based on combination of Arnold transform and exclusive-or operation. In information technology, networking, electronic and automation control conference 2020 (Vol. 1, pp. 151-4). IEEE.
[Crossref] [Google Scholar]
[23]Srivastava M, Siddiqui J, Ali MA. Local binary pattern based technique for content based image copy detection. In international conference on power electronics & IoT applications in renewable energy and its control 2020 (pp. 374-7). IEEE.
[Crossref] [Google Scholar]
[24]Samvatsar M, Kanungo P. An analytical review and analysis for the data control and security in cloud computing. International Journal of Advanced Technology and Engineering Exploration. 2020; 7(73):241-6.
[Crossref] [Google Scholar]
[25]Pramanik S, Bandyopadhyay SK, Ghosh R. Signature image hiding in color image using steganography and cryptography based on digital signature concepts. In international conference on innovative mechanisms for industry applications 2020 (pp. 665-9). IEEE.
[Crossref] [Google Scholar]
[26]Kushnir M, Kosovan H, Kroialo P, Komarnytskyy A. Encryption of the images on the basis of two chaotic systems with the use of fuzzy logic. In international conference on advanced trends in radioelectronics, telecommunications and computer engineering 2020 (pp. 610-3). IEEE.
[Crossref] [Google Scholar]
[27]Han B, Jia Y, Huang G, Cai L. A medical image encryption algorithm based on Hermite chaotic neural network. In information technology, networking, electronic and automation control conference 2020 (Vol. 1, pp. 2644-8). IEEE.
[Crossref] [Google Scholar]
[28]Kaur S, Jindal A. Singular value decomposition (SVD) based image tamper detection scheme. In international conference on inventive computation technologies 2020 (pp. 695-9). IEEE.
[Crossref] [Google Scholar]
[29]Abdulrahman A, Varol S. A review of image segmentation using MATLAB environment. In international symposium on digital forensics and security 2020 (pp. 1-5). IEEE.
[Google Scholar]
[30]Zhang H, Zhu J, Zhao S, He Q, Zhong X, Liu J. A new image encryption algorithm based on 2D-LSIMM chaotic map. In international conference on advanced computational intelligence 2020 (pp. 326-33). IEEE.
[Crossref] [Google Scholar]
[31]Abdallah Y. Segmentation of brain stroke lesions using marker-based algorithms in CT images. In international conference on computer applications & information security 2020 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[32]Yadahalli SS, Rege S, Sonkusare R. Implementation and analysis of image steganography using least significant bit and discrete wavelet transform techniques. In international conference on communication and electronics systems 2020 (pp. 1325-30). IEEE.
[Crossref] [Google Scholar]
[33]Luo Y, Zhu L. Research on data augmentation for object detection based on x-ray security inspection picture. In international conference on advances in electrical engineering and computer applications 2020 (pp. 219-22). IEEE.
[Crossref] [Google Scholar]
[34]Kukharska N, Lagun A, Polotai O. The steganographic approach to data protection using Arnold algorithm and the pixel-value differencing method. In international conference on data stream mining & processing 2020 (pp. 174-7). IEEE.
[Crossref] [Google Scholar]
[35]Kumar PR, Sarkar A, Mohanty SN, Kumar PP. Segmentation of white blood cells using image segmentation algorithms. In international conference on computing, communication and security 2020 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[36]Arpacı B, Kurt E. An innovative tool for the chaotic image encryption, decryption and security tests. In international conference on electrical, communication, and computer engineering 2020 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[37]Wang JZ, Li J, Wiederhold G. SIMPLIcity: Semantics-sensitive integrated matching for picture libraries. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2001; 23(9):947-63.
[Crossref] [Google Scholar]