Affiliation:
1. Department of Computer Science and Engineering, Jaypee University of Information Technology, Solan-173 234 HP, India
Abstract
Background:
Most of the work has been done using DES, AES, and MAES for key generation
in the image encryption. These algorithms provide better results for text based encryption
when compared with digital image encryption. These algorithms are less secure and efficient. A
new hybrid approach has been introduced for digital image encryption i.e. Chaos-based approach.
This approach is designed for image related data. Obtained results outperform the previous results
of encryption.
Objective:
To get the original image after decryption at the receiver’s end.
Methods:
Matrix array symmetric key algorithm has been used for key generation in which same
key is used for encryption and decryption process. Here, we have to fix the total number of iterations.
There will be three choices of iterations 10, 12 and 14 for 128, 192 and 256 bits key lengths
respectively. Once the key is generated, IWD algorithm is applied for encryption process and at the
end of sender and same key has to be used for decryption purpose at receiver’s end. Otherwise,
system will stop its functioning and will result into system error.
Results & Conclusion:
The proposed hybrid concept of MASK with iWD algorithm is implemented
on different set of images. Obtained results are satisfactorily while comparing the proposed approach
with other existing approaches for the various parameters like precision, recall and Fmeasure.
In future work, the proposed algorithm can be applied for the other types of cryptography
as well, like text, video sharing, etc.
Publisher
Bentham Science Publishers Ltd.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Nature-inspired whale optimization technique for efficient information exchange in vehicular networks;2023 IEEE 12th International Conference on Communication Systems and Network Technologies (CSNT);2023-04-08
2. CNN-based Smart Waste Management System in Fog Computing Environment;2023 IEEE 12th International Conference on Communication Systems and Network Technologies (CSNT);2023-04-08
3. A Hybrid Security Scheme for Inter-vehicle Communication in Content Centric Vehicular Networks;Wireless Personal Communications;2023-02-17
4. RVTN: Recommender system for vehicle routing in transportation network;2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC);2022-11-25
5. Trust and Reliability Management in the Cloud;Trust & Fault in Multi Layered Cloud Computing Architecture;2020