Cyber Security Role in Image Encryption

Authors

  • Ali Ahmed Jaddoa JADDOA
  • Asst. Prof. Dr. Sefer Kurnaz Electrical and Computer Engineering, Altinbas university, Istanbul, Turkey.

Keywords:

Cryptography, Public key cryptosystem, RSA cryptosystem, color and gray images, MATLAB.

Abstract

Digital images are vulnerable to unauthorized access, modification, and theft, making image encryption and decryption an essential aspect of information security. Image encryption and decryption is the process of converting a digital image from its original form to an unreadable format, ensuring its confidentiality and integrity. This study aims to explore various encryption and decryption techniques using MATLAB, a high-level programming language widely used for image processing. The methodology for this study involves implementing and testing different encryption and decryption algorithms on various types of digital images using MATLAB. The algorithms tested include symmetric-key encryption, such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES), and asymmetric-key encryption, such as RSA and ElGamal. The testing involves evaluating the security and speed of each algorithm and their compatibility with different image formats and sizes. The results of the study show that symmetric-key encryption algorithms, such as AES and DES, provide high levels of security and speed, making them suitable for large-scale image encryption and decryption applications. Asymmetric-key encryption algorithms, such as RSA and ElGamal, provide enhanced security but are slower than symmetric-key encryption algorithms. The study also highlights the importance of key management and storage in ensuring the security of the encrypted images. The study identifies several future research directions, including the development of hybrid encryption algorithms that combine the strengths of symmetric and asymmetric encryption, and the integration of biometric authentication for enhanced security. The study also emphasizes the need for more research on the impact of encryption and decryption on image quality and the development of efficient and compatible algorithms for different image formats and sizes. Overall, this study provides insights into the implementation and testing of encryption and decryption techniques for digital images using MATLAB. The findings highlight the importance of balancing security and speed in choosing encryption algorithms and the need for effective key management to ensure the security of encrypted images. The study's results and future research directions can guide the development of robust and efficient image encryption and decryption techniques for enhanced information security.

References

. Andrews, J.G., A. Ghosh, and R. Muhamed, Fundamentals of WiMAX: understanding broadband wireless networking. 2007: Prentice Hall PTR.

. Liddell, H.G., R. Scott, and G.R. Berry, A lexicon, abridged from Liddell & Scott's Greek-English lexicon. 1901: Economy book house.

. Lin, S. and D.J. Costello, Error control coding. Vol. 123. 2004: Prentice-hall Englewood Cliffs.

. Build MEX-Files. 2013; R2013a: [Available from:http://www.mathworks.com/help/matlab/matlab_external/building-mex-files.html.

.Definition: Interoperability. Available from: http://interoperabilitydefinition.info/en/.

. Group, I.W., IEEE Standard for Local and Metropolitan Area Networks, Part 16: Air Interface for Fixed Broadband Wireless Access Systems. IEEE Std, 2004. 802: p. 16-2004.

. FIPS, P., 197: Advanced encryption standard (AES). National Institute of Standards and Technology, 2001.

. Kumar, A., Mobile broadcasting with WiMAX: principles, technology, and applications. 2012: Focal Press.

. Shon, T. and W. Choi, An analysis of mobile WiMAX security: vulnerabilities and solutions, in Network-Based Information Systems. 2007, Springer. p. 88-97. 103

. Nguyen, T., A survey of WiMAX security threats. Computer Science Department, Washington University, 2009.

. Mao, W., Modern Cryptography: Theory and Practice. 2003: Prentice Hall Professional Technical Reference. 740.

. Daemen, J. and V. Rijmen, The design of Rijndael: AES-the advanced encryption standard. 2002: Springer.

. Stinson, D.R., Cryptography: theory and practice. 2006: CRC press.

. Reason, J.M., End-to-end confidentiality for continuous-media applications in wireless systems. 2001: University of California, Berkeley.

Arnone, L., et al., Security and BER performance trade-off in wireless communication systems applications. Latin American applied research, 2009. 39(3): p. 187-192.

. Kim, K. and J. Hong, Performance Analysis of Digital Secure Voice Transmission over HF Radio Channel, in Advances in Information Security and Assurance. 2009, Springer. p. 337-346.

. Buchholz, J.J., Advanced Encryption Standard. Available online at bushels. Hsbremen. De/aes/aes. html, 2001.

. Dworkin, M., Recommendation for block cipher modes of operation. Methods and techniques. 2001, DTIC Document.

. Lipmaa, H., P. Rogaway, and D. Wagner. CTR-mode encryption. in First NIST Workshop on Modes of Operation. 2000.

. McGrew, D.A., Counter mode security: Analysis and recommendations. Cisco Systems, November, 2002. 104

. Housley, R., Using advanced encryption standard (AES) counter mode with IPsec encapsulating security payload (ESP). 2004.

. Ross, S.M., Introduction to probability models. 2006: Access Online via Elsevier.

. Sattar, F. and M. Mufti, On Post Decryption Error Probability in Counter Mode Operation with Explicit Counter Transmittal. 24. Wallace, H., Error detection and correction using the bch code. EBook UNDUH, 2001.

Haraty, R.A., A.N. El-Kassar and B. Shibaro, 2006. A comparative study of rsa based digital signature algorithms. J. Math. Stat., 2: 354-359. 146 International Journal of Sciences: Basic and Applied Research (IJSBAR)(2014) Volume 14, No 2, pp 141-147

Schnorr, C. P. and Jakobsson, M., 2000. Security of signed ElGamal encryption. Springer Berlin Heidelberg.

Downloads

Published

2023-07-06

How to Cite

Ali Ahmed Jaddoa JADDOA, & Asst. Prof. Dr. Sefer Kurnaz. (2023). Cyber Security Role in Image Encryption. International Journal of Scientific Trends, 2(7), 20–44. Retrieved from https://scientifictrends.org/index.php/ijst/article/view/112

Issue

Section

Articles