Enhancing Cryptography of Grayscale Images via Resilience Randomization Flexibility

Enhancing Cryptography of Grayscale Images via Resilience Randomization Flexibility

Adnan Gutub
Copyright: © 2022 |Pages: 28
DOI: 10.4018/IJISP.307071
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Images are the most used e-files within normal personal life utilization affecting overall community safety and security. This research focuses on grayscale images security via resilience crypto-encryption nonviolent utilization. The work relies on flexibility XOR randomizations searching for most secure image crypto scheme testing different pseudo random number generators (PRNG) aiming to select best choice for security enhancement. The experimentations assume flexibly in selecting crypto operation as well as PRNG changings depending on e-image variations. The research implements several encryption schemes adopting substitution and transposition in variance attempts. All PRNGs are tested to encrypt the grayscale images revealing attractive prioritization remarks. The paper search anticipates to recognize an overview of enhancing cryptography of grayscale images via resilience randomization flexibility. The work PRNG and crypto-operation flexibility provided best interesting privacy intellectual image security as innovative basic crypto research track to build upon.
Article Preview
Top

1. Introduction

Digitalization of our common e-life made any multimedia communication and storage in risk due to illegitimate security breaches. Any e-data usage within insecure communication channels or storage is vulnerable to attacks concerning confidentiality, integrity, and availability (CIA), as main driving force for enhancing IT security urgency (Gutub et al., 2019). E-multimedia files run almost all industries requiring ongoing authentic setting guaranteeing safe delivery and storage of all e-data (Alharthi & Gutub, 2017). Digital images, as focus of our research, is the most widespread media type used needing proper security (Gutub et al., 2019). Therefore, e-image encryption is compulsory for protecting privacy as well as preventing undesired manipulation, which is provided via image symmetric cryptography via confirmed agreed-upon key passwords (Alharthi & Gutub, 2017). Image encryption is mandatory to secure its content as more breaches are occurring continuously remarking uncertain and/or untrusted e-media formation (Gutub, 2011). Cryptography provides encryption of image e-formation to cipher-image (Al-Otaibi & Gutub, 2014) via diverse math formulation, i.e. to change it into unusable data (Gutub & Tenca, 2004). The security process necessitates password key symmetrically used the same for image encryption and decryption providing needed security (Al-Juaid & Gutub, 2019). Therefore, many crypto approaches designed for image encryption are not coping to today’s technology improvements needing to be revisited. For example, original AES famous crypto is becoming to lose from its efficiency for image encryption, due to data patterns construction, insisting on special AES tuning remarking many manipulations (Saha et al., 2018). In general, encryption can be performed via transposition or substitution as well as combination of both. The transposition technique relocates pixels position shuffled based on positioning rules, as shown simplified in Figure 1. The substitution process is used to replace pixel values in a way that can be retrieved uniquely via password key whenever needed. Both methods accomplish the security goals of confusion and diffusion adhering to cryptography secrecy attitude (Al-Juaid & Gutub, 2019). Image crypto approaches can be commonly understood via three models, namely permuting, substituting, and combination of both. The permuting pixels relocate the pixels spots via reordering, as illustrated in Figure 2. The substituting performs replacing reformation via key generator hiding originality. The combination of permutation and substitution can be interesting benefitting from advantages of both (Banthia & Tiwari, 2013).

This paper deals with symmetric encryption as process uses password key as same for encryption and decryption (Gutub & Tenca, 2004). Our crypto modelling uses the password key to ignite the pseudo-random number generator (PRNG) to produce secret sequence stream to be involved mathematically with the image pixels to form intended encryption (Banthia & Tiwari, 2013). This PRNG random sequence needs to enjoy unpredictability and randomness, as main trusting features to be considered (Sivakumar & Devi, 2017).

Figure 1.

Transposition articulation

IJISP.307071.f01

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing