Skip to main content

Study on the Encryption and Decryption Capabilities of Hybrid Techniques for Images

  • Conference paper
  • First Online:
Intelligent Sustainable Systems (ICoISS 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 665))

Included in the following conference series:

  • 407 Accesses

Abstract

Data plays an important role in modern life, and because more and more gadgets are connecting to the internet, the amount of data stored online is growing at an alarming rate, which raises the possibility that the information could be stolen and used unethically. The most vulnerable type of data is visual, as a large number of users today keep their personal photographs in online storage facilities such as Google Photos and Google Drive, among others. Data encryption, which can make use of either symmetric or asymmetric keys, is one of the many innovative methods that are being developed in order to improve security. This study explains various methods of encryption and decryption that are used today. In addition to that, it explains the tiniest possible implementation of an image encryption technique, which makes use of a method that is somewhat analogous to symmetric-key cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Lin C-C, Tsai W-H (2003) Visual cryptography for gray-level images by dithering techniques. Pattern Recogn Lett 24(1–3):349–358

    Article  MATH  Google Scholar 

  2. Zhou Z, Arce GR (2006) Giovanni Di Crescenzo: Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453

    Article  Google Scholar 

  3. Rao UH, Nayak U (2014) Cryptography. In: The InfoSec Handbook, pp. 163–181. Apress, Berkeley, CA

    Google Scholar 

  4. Nahta R, Jain T, Narwaria A, Kumar H, Gupta RK (2020) Image encryption decryption using simple and modified version of AES. In: Somani AK, Shekhawat RS, Mundra A, Srivastava S, Verma VK (eds) Smart systems and IoT: Innovations in computing. smart innovation, systems and technologies, vol. 141. Springer, Singapore

    Google Scholar 

  5. Swarna Priya RM, Maddikunta PKR, Parimala M, Koppu S, Gadekallu TR, Chowdhary CL, Alazab M (2020) An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput. Commun. 160:139–149

    Google Scholar 

  6. Kaur M, Kumar V (2020) A Comprehensive review on image encryption techniques. Arch. Comput. Methods Eng. 27:15–43

    Article  MathSciNet  Google Scholar 

  7. P AK, G SS, Maddikunta PKR, Gadekallu TR, Al-Ahmari A, Abidi MH (2020) Location based business recommendation using spatial demand. Sustainability 12(10): 4124

    Google Scholar 

  8. Han Q, Wang L, Lee Y, Qin J (2020) Video encryption scheme using hybrid encryption technology. Int J Internet Protoc Technol 13(1):1–8

    Article  Google Scholar 

  9. Chowdhary CL (2019) 3D object recognition system based on local shape descriptors and depth data analysis. Recent Patents Comput Sci 12(1): 18–24

    Google Scholar 

  10. Liu YiHe, Zhang S (2020) Information security and storage of Internet of Things based on block chains. Futur Gener Comput Syst 106:296–303

    Article  Google Scholar 

  11. Tiwari D, Singh A, Prabhakar A (2020) Performance analysis of AES, RSA and hashing algorithm using web technology. In: Giri V, Verma N, Patel R, Singh V (eds) Computing algorithms with applications in engineering. algorithms for intelligent systems. Springer, Singapore

    Google Scholar 

  12. Mortajez S, Tahmasbi M, Zarei J, Jamshidnezhad A (2020) A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images. Inform Med Unlocked 20:100396

    Article  Google Scholar 

  13. Chowdhary CL, Muatjitjeja K, Jat DS (2015) Three-dimensional object recognition based intelligence system for identification. In: Proceedings of the 2015 International conference on emerging trends in networks and computer communications (ETNCC), pp 162–166. IEEE, Piscataway, NJ, USA

    Google Scholar 

  14. Jin X, Duan X, Jin H, Ma Y (2020) A novel hybrid secure image encryption based on the shuffle algorithm and the hidden attractor chaos system. Entropy 22(6):640

    Article  MathSciNet  Google Scholar 

  15. Hashim HR, Neamaa IA (2014) Image encryption and decryption in a modification of ElGamal cryptosystem in MATLAB. Int J Sci: Basic Appl Res (IJSBAR) 14(2):141–147

    Google Scholar 

  16. Chowdhary CL, Mittal MPK, Pattanaik PA, Marszalek Z (2020) An efficient segmentation and classification system in medical images using intuitionist possibilistic fuzzy C-mean clustering and fuzzy SVM algorithm. Sensors 20(14):3903

    Google Scholar 

  17. Hardi SM, Tarigan JT, Safrina N (2018) Hybrid cryptosystem for image file using elgamal and double Playfair cipher algorithm. In: Proceedings of the 2nd International conference on computing and applied informatics 2017, pp 012068. IOP Conference Series: Journal of Physics: Conference Series, Medan, Indonesia 978

    Google Scholar 

  18. Hamad S, Khalifa A, Elhadad A, Rida SZ (2013) A modified playfair cipher for encrypting digital images. J Commun Comput Eng 3(2): 1–9

    Google Scholar 

  19. Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and AES algorithm. J Supercomput 75:6663–6682

    Article  Google Scholar 

  20. Visu P, Sivakumar N, Kumaresan P, Yokesh Babu S, Ramesh PS (2020) Removing leaf petioles and auto locating apex-base points using straight line interpolation and bisection. Multimed Tools Appl 79: 5355–5369

    Google Scholar 

  21. Dawahdeh ZE, Yaakob SN (2018) Rozmie Razif bin Othman: A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher. J King Saud Univ-Comput Inf Sci 30(3):349–355

    Google Scholar 

  22. Anwar MN, Hasan M, Hasan MM, Loren JZ, Hossain ST (2019) Comparative study of cryptography algorithms and its’ applications. Int J Comput Netw Commun Secur 7(5):96–103

    Google Scholar 

  23. Srinivasan Nagaraj GSVP (2015) Raju: Image security using ECC approach. Indian J Sci Technol 8(26):1–5

    Google Scholar 

  24. Nita SL, Mihailescu M (2020) I: A Searchable encryption scheme based on elliptic curves. In: Barolli L, Amato F, Moscato F, Enokido T, Takizawa M (eds) Web, artificial intelligence and network applications, vol 1150. WAINA 2020, Advances in intelligent systems and computing. Springer, Cham, pp 810–821

    Chapter  Google Scholar 

  25. Sharma A, Singh A, Kumar A (2022) Encryption and decryption of marker based 3- dimensional augmented reality image using modified hill cipher technique for secure transfer. In: 2022 IEEE 2nd International conference on computer communication and artificial intelligence (CCAI), pp 155–159. IEEE, Beijing, China

    Google Scholar 

  26. Rupa IS, Manideep K, Kamale NM, Suhasini S (2022) Information security using chaotic encryption and decryption of digital images. In: 2022 International conference on innovative computing, intelligent communication and smart electrical systems (ICSES), pp 1–7. IEEE, Chennai, India

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nongmeikapam Thoiba Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, N.T., Dayal, R., Kanwal, D., Bhardwaj, A. (2023). Study on the Encryption and Decryption Capabilities of Hybrid Techniques for Images. In: Raj, J.S., Perikos, I., Balas, V.E. (eds) Intelligent Sustainable Systems. ICoISS 2023. Lecture Notes in Networks and Systems, vol 665. Springer, Singapore. https://doi.org/10.1007/978-981-99-1726-6_64

Download citation

Publish with us

Policies and ethics