Asymmetric image authentication algorithm using double random modulus decomposition and CGI
In this paper, we have proposed asymmetric image encryption cum authentication cryptosystem based on double random modulus decomposition using computational ghost imaging in the Fourier domain. The literature demonstrates that image encryption algorithms relying on double random modulus decompositio...
Saved in:
Published in | Computational & applied mathematics Vol. 42; no. 7 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Cham
Springer International Publishing
01.10.2023
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In this paper, we have proposed asymmetric image encryption cum authentication cryptosystem based on double random modulus decomposition using computational ghost imaging in the Fourier domain. The literature demonstrates that image encryption algorithms relying on double random modulus decomposition are susceptible to iterative cryptographic attacks. Computational ghost imaging is used to enhance the security of double random modulus decomposition-based cryptosystem and resistant to iterative cryptographic attack. The encrypted image is quite random and appear noisy and can be used for encryption as well as authentication purpose. The proposed cryptosystem is validated for binary, grayscale and medical images. Various statistical metrics, such as mean squared error, information entropy, and correlation coefficient, are applied to analyse the strength of the cryptosystem. Statistical attacks in terms of correlation distribution plots, 3-D plots are performed on the cryptosystem. The results indicate that the cryptosystem is robust against statistical attacks. All decryption keys are essential for faithful recovery of the original image as well as in the authentication cryptosystem. However, in the authentication cryptosystem, we have shown that if more than 6% of any individual key data are lost, cryptosystem fail to recognise the image. Therefore, the proposed encryption cum authentication cryptosystem is safe and secure. |
---|---|
ISSN: | 2238-3603 1807-0302 |
DOI: | 10.1007/s40314-023-02443-2 |