A Novel Design of an Image Encryption and Decryption Scheme Using Enhanced Cybersecurity Principles

Information security has risen to the top of the priority list as a direct result of the fast expansion of digital communication transmission and delivery. Protecting sensitive picture information is becoming more important than it has ever been before as the usage of images becomes increasingly com...

Full description

Saved in:
Bibliographic Details
Published in2023 International Conference on Emerging Research in Computational Science (ICERCS) pp. 1 - 6
Main Authors R, Ganesamoorthy, G, Pushpa, B, Senthilkumar, Krishnaprasanna, R., G, Vijayalakshmi, Pandi, V. Samuthira
Format Conference Proceeding
LanguageEnglish
Published IEEE 07.12.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Information security has risen to the top of the priority list as a direct result of the fast expansion of digital communication transmission and delivery. Protecting sensitive picture information is becoming more important than it has ever been before as the usage of images becomes increasingly common. The requirement to protect one's reputation has reached the level of an absolute necessity. The safeguarding of one's privacy has developed into an activity of critical importance. There is a wide range of different approaches that have been developed as a means of protecting sensitive data as well as the privacy of individuals. Images are encrypted to protect sensitive data from being viewed by unauthorized parties. Encryption is a popular practice that is utilized for the purpose of protecting confidential information from prying eyes. In this study, we enhance the performance of image encryption by utilizing a revised version of the Enhanced Image Cryptography Principle (EICP) that makes use of a key stream generator. This helps us get better results. All cryptographic approaches for sending pictures over an unsecured network make use of image cryptography approaches. The researchers have developed a number of such methods for safely and effectively communicating information over an unsafe network and these approaches are used by all cryptographic approaches. This study aims to demonstrate the restricted encryption methods that were applied to disguise the image over a susceptible network in order to accomplish its purpose. This research proposes a novel encryption method that has been given the acronym EICP. The goal of this method is to improve image cryptography in a timely manner. The proposed approach is cross-validated with the conventional cryptographic algorithm called Rivest, Shamir, and Adleman (RSA) to prove the efficiency of the proposed approach in fine manner.
DOI:10.1109/ICERCS57948.2023.10434166