Affiliation:
1. Department of Quality Assurance and University Performance, Mustansiriyah University, Baghdad-Iraq
Abstract
The security of digital images is of paramount importance in today's digital world. Encryption is a technique used to secure digital images from unauthorized access. The encryption technique transforms the original image into a scrambled form, which is unreadable to anyone without the proper decryption key. Several encryption techniques have been proposed to secure digital images, including DES, AES, RSA, and ECC. These methods, however, are susceptible to side-channel and brute-force attacks. Hence, new encryption methods that offer more security are required. The new multi-encryption algorithm for secure digital image encryption is presented in this research. The suggested approach combines the RC4, Zigzag transformation, and Elliptic Curve Cryptography (ECC) algorithms to increase the security of picture encryption. Data is encrypted using the RC4 stream cipher, image data is scrambled using the Zigzag method, and the key used in the transformation is encrypted using the ECC technique. The proposed algorithm was tested using several standard metrics, and the results show that it outperforms existing encryption techniques in terms of security.
Reference15 articles.
1. Baha Eldin Hamouda Hassan Hamouda, “Comparative Study of Different Cryptographic Algorithms”, Journal of Information Security, Vol.11 No.3, July 2020, DOI: 10.4236/jis.2020.113009.
2. Karule, K.P. and Nagrale, N.V. (2016) Comparative Analysis of Encryption Algorithms for Various Types of Data Files for Data Security. International Journal of Scientific Engineering and Applied Science, 2, 495-498.
3. Srinivas Koppu1and V. Madhu Viswanatham2,” A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform”, Modelling and Simulation in Engineering Volume 2017, Article ID 7470204, 12 pages https://doi.org/10.1155/2017/7470204.
4. Ahmed Othman Khalaf 1, Shaimaa Khudhair Salah2, Hind Jumaa Sartep3, and Zainab Khyioon Abdalrdha4, “Subject Review: Comparison between RSA, ECC & NTRU Algorithms”, International Journal of Engineering Research and Advanced Technology (IJERAT), Volume.5, Issue 11 November -2019 DOI: 10.31695/IJERAT.2019.3582
5. Zolfaghari, B.; Bibak, K.; Koshiba, T. The odyssey of entropy: Cryptography. Entropy 2022, 24, 266. https://doi.org/10.3390/e24020266.