Cargando…
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7570629/ https://www.ncbi.nlm.nih.gov/pubmed/32927714 http://dx.doi.org/10.3390/s20185162 |
_version_ | 1783596991073222656 |
---|---|
author | Chowdhary, Chiranji Lal Patel, Pushpam Virenbhai Kathrotia, Krupal Jaysukhbhai Attique, Muhammad Perumal, Kumaresan Ijaz, Muhammad Fazal |
author_facet | Chowdhary, Chiranji Lal Patel, Pushpam Virenbhai Kathrotia, Krupal Jaysukhbhai Attique, Muhammad Perumal, Kumaresan Ijaz, Muhammad Fazal |
author_sort | Chowdhary, Chiranji Lal |
collection | PubMed |
description | The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption. |
format | Online Article Text |
id | pubmed-7570629 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-75706292020-10-28 Analytical Study of Hybrid Techniques for Image Encryption and Decryption Chowdhary, Chiranji Lal Patel, Pushpam Virenbhai Kathrotia, Krupal Jaysukhbhai Attique, Muhammad Perumal, Kumaresan Ijaz, Muhammad Fazal Sensors (Basel) Article The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption. MDPI 2020-09-10 /pmc/articles/PMC7570629/ /pubmed/32927714 http://dx.doi.org/10.3390/s20185162 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Chowdhary, Chiranji Lal Patel, Pushpam Virenbhai Kathrotia, Krupal Jaysukhbhai Attique, Muhammad Perumal, Kumaresan Ijaz, Muhammad Fazal Analytical Study of Hybrid Techniques for Image Encryption and Decryption |
title | Analytical Study of Hybrid Techniques for Image Encryption and Decryption |
title_full | Analytical Study of Hybrid Techniques for Image Encryption and Decryption |
title_fullStr | Analytical Study of Hybrid Techniques for Image Encryption and Decryption |
title_full_unstemmed | Analytical Study of Hybrid Techniques for Image Encryption and Decryption |
title_short | Analytical Study of Hybrid Techniques for Image Encryption and Decryption |
title_sort | analytical study of hybrid techniques for image encryption and decryption |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7570629/ https://www.ncbi.nlm.nih.gov/pubmed/32927714 http://dx.doi.org/10.3390/s20185162 |
work_keys_str_mv | AT chowdharychiranjilal analyticalstudyofhybridtechniquesforimageencryptionanddecryption AT patelpushpamvirenbhai analyticalstudyofhybridtechniquesforimageencryptionanddecryption AT kathrotiakrupaljaysukhbhai analyticalstudyofhybridtechniquesforimageencryptionanddecryption AT attiquemuhammad analyticalstudyofhybridtechniquesforimageencryptionanddecryption AT perumalkumaresan analyticalstudyofhybridtechniquesforimageencryptionanddecryption AT ijazmuhammadfazal analyticalstudyofhybridtechniquesforimageencryptionanddecryption |