Journal of Cybersecurity and Information Management
JCIM
2690-6775
2769-7851
10.54216/JCIM
https://www.americaspg.com/journals/show/1815
2019
2019
An Improved Analysis of Secured Permutation and Substitution based Image Encryption
Department of Information Technology, Kiet group of institutions, Ghaziabad, India
Vikas
Vikas
Department of CA, Kiet group of institutions, Ghaziabad, India
Amit Kumar
Goyal
The transmission and storage of digital data raises serious security concerns as information technology evolves at a breakneck pace. To ensure the safety of the transferred data, security methods must be put in place. Encrypting an image is a method of protecting sensitive data by converting it into an unrecognizable format. The procedure includes access control, privacy, validation, and copyright protection. Cryptography, steganography, and watermarking are three distinct methods to prevent unauthorized access to digital data. Of these three methods, cryptography has emerged as one of the most important ways to ensure complete safety. Therefore, a secure and efficient cipher algorithm is required for trustworthy communication. In this work, we offer a practical Secured Asymmetric Image Cipher (SAIC) Algorithm for encrypting images with a secret key of arbitrary length. At first, the KG algorithm creates two unique keys. Both the encryption and decryption processes require a key. The experimental results reveal that the encrypted image lacks the original image's independence (NPCR > 99.89%, UACI > 36.89%). The suggested approach has a high encryption rate, can be implemented easily, and is computationally secure. The reproduced data validates the safety and practicability of the proposed architecture.
2023
2023
30
40
10.54216/JCIM.120103
https://www.americaspg.com/articleinfo/2/show/1815