Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm

2017 ◽  
Vol 6 (1) ◽  
Author(s):  
Abdelkader Moumen ◽  
Hocine Sissaoui

AbstractVulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels. To improve communication security, many cryptosystems have been presented in the image encryption literature. This paper proposes a novel image encryption technique based on an algorithm that is faster than current methods. The proposed algorithm eliminates the step in which the secrete key is shared during the encryption process. It is formulated based on the symmetric encryption, asymmetric encryption and steganography theories. The image is encrypted using a symmetric algorithm, then, the secret key is encrypted by means of an asymmetrical algorithm and it is hidden in the ciphered image using a least significant bits steganographic scheme. The analysis results show that while enjoying the faster computation, our method performs close to optimal in terms of accuracy.

Author(s):  
Sabyasachi Pramanik ◽  
Ramkrishna Ghosh ◽  
Mangesh M. Ghonge ◽  
Vipul Narayan ◽  
Mudita Sinha ◽  
...  

In the information technology community, communication is a vital issue. And image transfer creates a major role in the communication of data through various insecure channels. Security concerns may forestall the direct sharing of information and how these different gatherings cooperatively direct data mining without penetrating information security presents a challenge. Cryptography includes changing over a message text into an unintelligible figure and steganography inserts message into a spread media and shroud its reality. Both these plans are successfully actualized in images. To facilitate a safer transfer of image, many cryptosystems have been proposed for the image encryption scheme. This chapter proposes an innovative image encryption method that is quicker than the current researches. The secret key is encrypted using an asymmetric cryptographic algorithm and it is embedded in the ciphered image using the LSB technique. Statistical analysis of the proposed approach shows that the researcher's approach is faster and has optimal accuracy.


2012 ◽  
Vol 241-244 ◽  
pp. 2728-2731
Author(s):  
Yong Zhang

Some chaos-based image encryption schemes using plain-images independent secret code streams have weak encryption security and are vulnerable to chosen plaintext and chosen cipher-text attacks. This paper proposed a two-level secret key image encryption method, where the first-level secret key is the private symmetric secret key, and the second-level secret key is derived from both the first-level secret key and the plain image by iterating piecewise linear map and Logistic map. Even though the first-level key is identical, the different plain images will produce different second-level secret keys and different secret code streams. The results show that the proposed has high encryption speed, and also can effectively resist chosen/known plaintext attacks.


2019 ◽  
Vol 8 (3) ◽  
pp. 4481-4484

Image encryption has proven a successful method to communicate the confidential information. Some of the images may or may not be confidential. So there is a need to secure the confidential images. Initially, symmetric encryption is used for security purpose. But it has the problem that if the key is revealed the interceptors can immediately decode it. To make the key transformation more secure, asymmetric encryption is introduced. In this two different keys are used for encoding and decoding. So even the interceptors hacked the key it cannot be possible to decode. In this project Elliptic Curve Cryptography (ECC) is utilized for generating the keys and the cross chaotic map used for generating the chaotic sequence. These chaotic sequences are utilized to encode the image for secure communication.


2013 ◽  
Vol 284-287 ◽  
pp. 2992-2997 ◽  
Author(s):  
Xiao Wei Li ◽  
Dong Hwan Kim ◽  
Sung Jin Cho ◽  
Seok Tae Kim

Three dimensional (3-D) images encryption schemes can provide feasible and secure for images encryption due to the 3-D properties of images. In this paper, we present a novel 3-D images encryption algorithm by combining use of integral imaging (II) and maximum-length cellular automata (MLCA) as the secret key ciphering for 3D image encryption technique. In this proposed algorithm, a lenslet array first decomposes the 3-D object into 2-D elemental images (EIs) via the pick-up process of II. We encrypt the 2-D EIs with an encryption method based on linear and complemented MLCA. Decryption process is the opposite of operation encryption process: The 2-D EIs is recovered by the MLCA key, 3-D object is reconstructed by the recovered EIs via computational integral imaging (CII) reconstruction. To verify the usefulness of the proposed algorithm, we carry out the computational experiments and present the experimental results for various attacks. Experimental results show that the proposed algorithm can improve the performance of encryption against various attacks due to large key space in MLCA and 3-D characteristic of data redundancy.


Author(s):  
Shima Ramesh Maniyath ◽  
Thanikaiselvan V.

In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or disordered to enhance the ability to confront attack and in turn improve the security. This paper mainly focused on the multiple encryption Techniques with multiple keys on a single image by dividing it into four blocks. So instead of using one Encryption method a combination of four different Encryption Algorithm can make our image more secure. The Encryption is done first by using DNA as secret key, second by using RSA, third by DES and fourth by Chebyshev. The pros and cons for all the Encryption methods are discussed here. Proposed methodology can strongly encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major benefits related with this system. The first benefit is the use of Different Algorithm with different keys. The second benefit is that even though we are using four different Algorithm for a single image, the time taken for encryption and decryption is few seconds only. Our method is methodically checked, and it shows an exceptionally high level of security with very good image quality.


Author(s):  
Tran Thanh ◽  
Tran Hoang Vu ◽  
Nguyen Van Cuong ◽  
Pham Ngoc Nam

Cryptographic  solution  for  protecting  data which  pass  through  an  insecure  public  network  is widely  applied.  To  ensure  the  data  confidentiality  and availability,  the  secret  key  must  be  exchanged  securely between  parties before  beginning  a  transaction  session. This paper presents a protocol to enhance the flexibility and  secrecy  of  symmetric  key  exchange  over  the Internet. Our approach uses an asymmetric encryption algorithm  to  protect  symmetric  encryption  keys  from thefts and tampers over a transmission line. In addition, this  paper  presents  a  protocol  to  ensure  the  integrity, confidentiality  of  the  symmetric  key,  and  the  freshness of  a  transaction  session.  Experimental  results  from  a prototype system based on FPGA are also revealed.


2020 ◽  
Vol 2020 ◽  
pp. 1-14 ◽  
Author(s):  
Kaixin Jiao ◽  
Guodong Ye ◽  
Youxia Dong ◽  
Xiaoling Huang ◽  
Jianqing He

This study proposes a new image encryption scheme based on a generalized Arnold map and Rivest–Shamir–Adleman (RSA) algorithm. First, the parameters of the generalized Arnold map are generated by an asymmetric encryption-system RSA algorithm, and the keystream is produced iteratively. To change the distribution of pixel values, the image data are hidden by XOR diffusion. Second, both rows and columns of the image are cyclically confused to hide the image data again. Then, the additive mode diffusion operation is performed to realize third-layer hiding for image content. The overall diffusion and confusion operations are conducted twice to obtain the final cipher image. Test results prove that the encryption scheme proposed in this study is effective and has strong antiattack capabilities and key sensitivity. In addition, because the scheme security relies on the RSA algorithm, it has high security.


Author(s):  
Ranu Gupta ◽  
Rahul Pachauri ◽  
Ashutosh K. Singh

This article explores an efficient way of image encryption using chaotic logistic function. A set of two chaotic logistic functions and a 256 bit long external secret key are employed to enhance the security in the encrypted images. The initial condition of first logistic function has been obtained by providing the suitable weights to all bits of the secret key. The initial condition of second logistic function has been derived from first chaotic logistic function. In this proposed algorithm, ten different operations are used to encrypt the pixel of an image. The outcome of the second logistic map decides the operation to be used in the encryption of the particular image pixel. Various statistical parameter comparisons show that the proposed algorithm provides an image encryption method with better security and efficiency for all real-time applications.


Author(s):  
Ranu Gupta ◽  
Rahul Pachauri ◽  
Ashutosh Kumar Singh

Introduction: With the advancement in internet technology, a large amount of information in the form of data and image is transferred from one end to the other. The information may be military, defense, medical, etc. which should be kept confidential by providing security. Objective: The aim of this article will be to provide security to the image. This is achieved by applying the image encryption method which converts the original information into an unreadable format. Methods: This work explores an efficient way of image encryption using a chaotic logistic function. A set of two chaotic logistic functions and 256 bit long external secret key are employed to enhance the security in the encrypted images. The initial condition of first logistic function has been obtained by providing the suitable weights to all bits of the secret key. The initial condition of second logistic function has been derived from the first chaotic logistic function. In this proposed algorithm, ten different operations are used to encrypt the pixel of an image. The outcome of the second logistic map decides the operation to be used in the encryption of the particular image pixel. Results: Various statistical parameters like NPCR, UACI and information entropy were calculated. Conclusion: Results show that the proposed algorithm provides an image encryption method with better security and efficiency for all real-time applications such as medical images.


Sign in / Sign up

Export Citation Format

Share Document