Skip to main content

Abstract

In this paper, we propose a cryptography system for digital image high securing. Our method is asymmetric utilizing RSA algorithm, which requires a public key for encryption and a private key for decryption. However, the image is encrypted with a combination between the AES-256 CTR mode algorithm and the SHA-2 function. Our algorithm is evaluated by several tools and tests mainly selected from the image cryptography community using many types of standard non compressed images. The experimental and analytical results demonstrate that our encryption scheme provides a high robustness and security. It can resist the most known cryptanalysis attacks. Very good results are obtained, which allows us to confirm the high performance and efficiency of our algorithm for image high protection, which can be used in several domains like military and community privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Banavath, D., Srinivasulu, T.: Multimedia cryptography- a review. In: International Conference on Power, Control, Signals and Instrumentation Engineering. IEEE, India (2017)

    Google Scholar 

  2. Samaher, J., Ibrahim, S.: A hybrid image steganography method based on genetic algorithm. In: 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT). IEEE, Hammamet, Tunisia (2016)

    Google Scholar 

  3. Med Karim, A., Ali, K., Med Salim, B.: A chaotic cryptosystem for color image with dynamic look-up table. In: 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT). IEEE, Hammamet, Tunisia (2016)

    Google Scholar 

  4. Yong, Z., Xueqian, L.: A fast Image encryption scheme based on AES. In: 2th International Conference on Image, Vision and Computing. IEEE, Chengdu, China (2017)

    Google Scholar 

  5. Unal, C.: Secure image encryption algorithm design using a novel chaos based S-Box. Chaos, Solitons Fractals 95, 92–101 (2017)

    Article  Google Scholar 

  6. Shelza, S.: An AES-chaos based hybrid approach to encrypt multiple images. In: Advances in Intelligent Systems and Computing 555. Springer (2017)

    Google Scholar 

  7. Akram, B.: Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt. Lasers Eng. 88, 37–50 (2017)

    Article  Google Scholar 

  8. Toughi, S.: An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Sig. Process. 141, 217–227 (2017)

    Article  Google Scholar 

  9. Yuhang, X., Min, L.: Chaotic-map image encryption scheme based on AES key producing schedule. In: Third International Conference on Data Science in Cyberspace. IEEE (2018)

    Google Scholar 

  10. Yashasvee, J., Kulveer, K.: Improving image encryption using two-dimensional logistic map and AES. In: International Conference on Communication and Signal Processing. IEEE, India (2016)

    Google Scholar 

  11. FIPS PUB 197: Advanced Encryption Standard (AES). Computer Security Standard, Cryptography (2001)

    Google Scholar 

  12. Jeba Nega, C.: An innovative encryption method for images using RSA, honey encryption and inaccuracy tolerant system using Hamming codes. In: International Conference on Computation of Power, Energy, Information and Communication. IEEE, India (2017)

    Google Scholar 

  13. FIPS PUB 186-4: Digital Signature Standard (DSS). Computer Security Standard, Cryptography (2013)

    Google Scholar 

  14. FIPS PUB 180-2: Secure Hash Signature standard (SHS). Computer Security Standard, Cryptography (2001)

    Google Scholar 

  15. Helger, L.: CTR-Mode Encryption. ResearchGate (2001)

    Google Scholar 

  16. Khalaf, A.: Fast image encryption based on random image key. Int. J. Comput. Appl. 134(3), 0975–8887 (2016)

    Google Scholar 

  17. Yue, W.: NPCR and UACI randomness tests for image encryption. J. Sel. Areas Telecommun. Cyber Journals (2011)

    Google Scholar 

  18. Kaouther, G.: Workflow for multi-core architecture: from matlab/simulink models to hardware mapping/scheduling. In: 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT). IEEE, Hammamet, Tunisia (2016)

    Google Scholar 

  19. Anissa, S.: Proposed unified 32-bit multiplier/inverter for asymmetric cryptography. In: 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT). IEEE, Hammamet, Tunisia (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Gafsi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gafsi, M., Ajili, S., Hajjaji, M.A., Malek, J., Mtibaa, A. (2020). High Securing Cryptography System for Digital Image Transmission. In: Bouhlel, M., Rovetta, S. (eds) Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol.1. SETIT 2018. Smart Innovation, Systems and Technologies, vol 146. Springer, Cham. https://doi.org/10.1007/978-3-030-21005-2_30

Download citation

Publish with us

Policies and ethics