Cargando…

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis...

Descripción completa

Detalles Bibliográficos
Autores principales: Chowdhary, Chiranji Lal, Patel, Pushpam Virenbhai, Kathrotia, Krupal Jaysukhbhai, Attique, Muhammad, Perumal, Kumaresan, Ijaz, Muhammad Fazal
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7570629/
https://www.ncbi.nlm.nih.gov/pubmed/32927714
http://dx.doi.org/10.3390/s20185162
_version_ 1783596991073222656
author Chowdhary, Chiranji Lal
Patel, Pushpam Virenbhai
Kathrotia, Krupal Jaysukhbhai
Attique, Muhammad
Perumal, Kumaresan
Ijaz, Muhammad Fazal
author_facet Chowdhary, Chiranji Lal
Patel, Pushpam Virenbhai
Kathrotia, Krupal Jaysukhbhai
Attique, Muhammad
Perumal, Kumaresan
Ijaz, Muhammad Fazal
author_sort Chowdhary, Chiranji Lal
collection PubMed
description The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
format Online
Article
Text
id pubmed-7570629
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75706292020-10-28 Analytical Study of Hybrid Techniques for Image Encryption and Decryption Chowdhary, Chiranji Lal Patel, Pushpam Virenbhai Kathrotia, Krupal Jaysukhbhai Attique, Muhammad Perumal, Kumaresan Ijaz, Muhammad Fazal Sensors (Basel) Article The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption. MDPI 2020-09-10 /pmc/articles/PMC7570629/ /pubmed/32927714 http://dx.doi.org/10.3390/s20185162 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Chowdhary, Chiranji Lal
Patel, Pushpam Virenbhai
Kathrotia, Krupal Jaysukhbhai
Attique, Muhammad
Perumal, Kumaresan
Ijaz, Muhammad Fazal
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
title Analytical Study of Hybrid Techniques for Image Encryption and Decryption
title_full Analytical Study of Hybrid Techniques for Image Encryption and Decryption
title_fullStr Analytical Study of Hybrid Techniques for Image Encryption and Decryption
title_full_unstemmed Analytical Study of Hybrid Techniques for Image Encryption and Decryption
title_short Analytical Study of Hybrid Techniques for Image Encryption and Decryption
title_sort analytical study of hybrid techniques for image encryption and decryption
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7570629/
https://www.ncbi.nlm.nih.gov/pubmed/32927714
http://dx.doi.org/10.3390/s20185162
work_keys_str_mv AT chowdharychiranjilal analyticalstudyofhybridtechniquesforimageencryptionanddecryption
AT patelpushpamvirenbhai analyticalstudyofhybridtechniquesforimageencryptionanddecryption
AT kathrotiakrupaljaysukhbhai analyticalstudyofhybridtechniquesforimageencryptionanddecryption
AT attiquemuhammad analyticalstudyofhybridtechniquesforimageencryptionanddecryption
AT perumalkumaresan analyticalstudyofhybridtechniquesforimageencryptionanddecryption
AT ijazmuhammadfazal analyticalstudyofhybridtechniquesforimageencryptionanddecryption