Efficient Encryption System for Numerical Image Safe Transmission
Open Access
- 31 October 2020
- journal article
- research article
- Published by Hindawi Limited in Journal of Electrical and Computer Engineering
- Vol. 2020, 1-12
- https://doi.org/10.1155/2020/8937676
Abstract
In this paper, we propose an efficient cryptosystem for digital image encryption and authentication. The cryptosystem is a hybrid scheme that uses symmetric and asymmetric approaches. The first one is used to encrypt the host image by utilizing a chaos-based key generator. The second one is used to encrypt the initial secret key and the owners signature that permit authentication. The algorithm is evaluated and validated by its application on several types of standard images and tools such as the statistical analysis, the key, and the performance analysis. The results indicate that the proposed cryptosystem provides high performance and enhanced security. The NIST 800-22 is used for testing the pseudorandom numbers generation (PRNG). The obtained simulation results are better than those cited in the recent works in terms of execution time and security level and low computational complexity.Keywords
Funding Information
- EuE Laboratory
This publication has 24 references indexed in Scilit:
- Secure image encryption algorithm design using a novel chaos based S-BoxChaos, Solitons, and Fractals, 2017
- Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transformsOptics and Lasers in Engineering, 2017
- Cryptography of medical images based on a combination between chaotic and neural networkIET Image Processing, 2016
- An image encryption scheme based on chaotic tent mapNonlinear Dynamics, 2016
- A new chaos-based image encryption systemSignal Processing: Image Communication, 2016
- Combining watermarking and encryption algorithm for medical image safe transfer: method based on DCTInternational Journal of Signal and Imaging Systems Engineering, 2016
- A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2Nonlinear Dynamics, 2015
- An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusionCommunications in Nonlinear Science and Numerical Simulation, 2013
- Image encryption using DNA complementary rule and chaotic mapsApplied Soft Computing, 2012
- Image Quality Assessment: From Error Visibility to Structural SimilarityIEEE Transactions on Image Processing, 2004