International Journal of Advanced Research in Computer and Communication Engineering

A monthly peer-reviewed online and print journal

ISSN Online 2278-1021
ISSN Print 2319-5940

Since 2012

Abstract: Color image encryption is important to ensure its confidentiality during its transmission on insecure networks or its storage. A compression-encryption model to solve these problems. This model consists of three processes. The first process is the dynamic symmetric key generation. The second one is the compression process, which is followed by encryption using key streams and S-Boxes that are generated using a chaotic logistic map. The last process is the symmetric key distribution. The asymmetric key is encrypted twice using Rivest-Shamir-Adleman (RSA) to provide both authentication and confidentiality. Then, it is inserted into the cipher image using the End of File (EoF) method. The evaluation shows that the symmetric key generator model can produce a random and dynamic symmetric key. Hence, the image data is safe from ciphertext-only attacks. This model is fast and able to withstand entropy attacks, statistical attacks, differential attacks, and brute-force attacks.

Keywords: Encryption,Decryption,Symmeteric Key,Dynamic key


PDF | DOI: 10.17148/IJARCCE.2021.10758

Open chat
Chat with IJARCCE