Abstract
In this paper, we propose a cryptography system for digital image high securing. Our method is asymmetric utilizing RSA algorithm, which requires a public key for encryption and a private key for decryption. However, the image is encrypted with a combination between the AES-256 CTR mode algorithm and the SHA-2 function. Our algorithm is evaluated by several tools and tests mainly selected from the image cryptography community using many types of standard non compressed images. The experimental and analytical results demonstrate that our encryption scheme provides a high robustness and security. It can resist the most known cryptanalysis attacks. Very good results are obtained, which allows us to confirm the high performance and efficiency of our algorithm for image high protection, which can be used in several domains like military and community privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Banavath, D., Srinivasulu, T.: Multimedia cryptography- a review. In: International Conference on Power, Control, Signals and Instrumentation Engineering. IEEE, India (2017)
Samaher, J., Ibrahim, S.: A hybrid image steganography method based on genetic algorithm. In: 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT). IEEE, Hammamet, Tunisia (2016)
Med Karim, A., Ali, K., Med Salim, B.: A chaotic cryptosystem for color image with dynamic look-up table. In: 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT). IEEE, Hammamet, Tunisia (2016)
Yong, Z., Xueqian, L.: A fast Image encryption scheme based on AES. In: 2th International Conference on Image, Vision and Computing. IEEE, Chengdu, China (2017)
Unal, C.: Secure image encryption algorithm design using a novel chaos based S-Box. Chaos, Solitons Fractals 95, 92–101 (2017)
Shelza, S.: An AES-chaos based hybrid approach to encrypt multiple images. In: Advances in Intelligent Systems and Computing 555. Springer (2017)
Akram, B.: Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt. Lasers Eng. 88, 37–50 (2017)
Toughi, S.: An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Sig. Process. 141, 217–227 (2017)
Yuhang, X., Min, L.: Chaotic-map image encryption scheme based on AES key producing schedule. In: Third International Conference on Data Science in Cyberspace. IEEE (2018)
Yashasvee, J., Kulveer, K.: Improving image encryption using two-dimensional logistic map and AES. In: International Conference on Communication and Signal Processing. IEEE, India (2016)
FIPS PUB 197: Advanced Encryption Standard (AES). Computer Security Standard, Cryptography (2001)
Jeba Nega, C.: An innovative encryption method for images using RSA, honey encryption and inaccuracy tolerant system using Hamming codes. In: International Conference on Computation of Power, Energy, Information and Communication. IEEE, India (2017)
FIPS PUB 186-4: Digital Signature Standard (DSS). Computer Security Standard, Cryptography (2013)
FIPS PUB 180-2: Secure Hash Signature standard (SHS). Computer Security Standard, Cryptography (2001)
Helger, L.: CTR-Mode Encryption. ResearchGate (2001)
Khalaf, A.: Fast image encryption based on random image key. Int. J. Comput. Appl. 134(3), 0975–8887 (2016)
Yue, W.: NPCR and UACI randomness tests for image encryption. J. Sel. Areas Telecommun. Cyber Journals (2011)
Kaouther, G.: Workflow for multi-core architecture: from matlab/simulink models to hardware mapping/scheduling. In: 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT). IEEE, Hammamet, Tunisia (2016)
Anissa, S.: Proposed unified 32-bit multiplier/inverter for asymmetric cryptography. In: 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT). IEEE, Hammamet, Tunisia (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Gafsi, M., Ajili, S., Hajjaji, M.A., Malek, J., Mtibaa, A. (2020). High Securing Cryptography System for Digital Image Transmission. In: Bouhlel, M., Rovetta, S. (eds) Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol.1. SETIT 2018. Smart Innovation, Systems and Technologies, vol 146. Springer, Cham. https://doi.org/10.1007/978-3-030-21005-2_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-21005-2_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21004-5
Online ISBN: 978-3-030-21005-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)