Journal of Cybersecurity and Information Management
  JCIM
  2690-6775
  2769-7851
  
   10.54216/JCIM
   https://www.americaspg.com/journals/show/1815
  
 
 
  
   2019
  
  
   2019
  
 
 
  
   An Improved Analysis of Secured Permutation and Substitution based Image Encryption
  
  
   Department of Information Technology, Kiet group of institutions, Ghaziabad, India
   
    Vikas
    Vikas
   
   Department of CA, Kiet group of institutions, Ghaziabad, India
   
    Amit Kumar
    Goyal
   
  
  
   The transmission and storage of digital data raises serious security concerns as information technology evolves at a breakneck pace. To ensure the safety of the transferred data, security methods must be put in place. Encrypting an image is a method of protecting sensitive data by converting it into an unrecognizable format. The procedure includes access control, privacy, validation, and copyright protection. Cryptography, steganography, and watermarking are three distinct methods to prevent unauthorized access to digital data. Of these three methods, cryptography has emerged as one of the most important ways to ensure complete safety. Therefore, a secure and efficient cipher algorithm is required for trustworthy communication.  In this work, we offer a practical Secured Asymmetric Image Cipher (SAIC) Algorithm for encrypting images with a secret key of arbitrary length. At first, the KG algorithm creates two unique keys. Both the encryption and decryption processes require a key.  The experimental results reveal that the encrypted image lacks the original image's independence (NPCR > 99.89%, UACI > 36.89%). The suggested approach has a high encryption rate, can be implemented easily, and is computationally secure. The reproduced data validates the safety and practicability of the proposed architecture.
  
  
   2023
  
  
   2023
  
  
   30
   40
  
  
   10.54216/JCIM.120103
   https://www.americaspg.com/articleinfo/2/show/1815