Secured Asymmetric Image Cipher (SAIC) Algorithm for Efficient and High-Security Image Encryption

Authors

  • Maanav Jain

Keywords:

Image Encryption, Asymmetric Cryptography, SAIC Algorithm, Key Generation, Diffusion and Confusion, Image Security, Compression and Encryption

Abstract

Privacy in digital image transmission over public networks has become a critical concern. Traditional cipher methods often fail to provide robust protection against known-plain image attacks and lack sensitivity to changes in the source image. This study proposes an efficient Secured Asymmetric Image Cipher (SAIC) algorithm employing a variable-sized secret key. The technique generates two distinct keys via a key generation (KG) algorithm: one for encryption and another for decryption. The encryption process integrates mixing, key-dependent permutation and substitution to scramble images into an unintelligible format. The decryption process uses inverse operations to retrieve the original image. The proposed approach ensures high levels of security and efficiency, with performance measures including NPCR > 99.99%, UACI > 36.7% and DR > 97%. The method combines asymmetric key cryptography with advanced diffusion and confusion strategies, making it computationally secure, fast and suitable for practical deployment in image processing and communication systems.

References

• Bouslimi, D., Coatrieux, G., Cozic, M., & Roux, C. (2012). A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Transactions on Information Technology in Biomedicine, 16(5), 891–899.

• Oh, O., Agrawal, M., & Rao, H. R. (2010). An exploration of social media in extreme events: Rumor theory and Twitter during the Haiti earthquake 2010. ICIS 2010 Proceedings.

• Ye, G. (2010). Image scrambling encryption algorithm based on chaotic system. Journal of Multimedia, 5(2), 128–135.

• Chen, Y., Sun, X., & Zhou, H. (2021). Joint image compression and encryption using block scrambling and secure set partitioning in hierarchical trees. Signal Processing: Image Communication, 96, 116282.

• Ciftci, U., & Aydin, N. (2022). Secure coding of medical images using compressed sensing. Computers in Biology and Medicine, 140, 105121.

Downloads

How to Cite

Maanav Jain. (2020). Secured Asymmetric Image Cipher (SAIC) Algorithm for Efficient and High-Security Image Encryption. International Journal of Engineering, Science and Humanities, 10(2), 19–28. Retrieved from https://www.ijesh.com/index.php/j/article/view/125

Issue

Section

Original Research Articles

Similar Articles

<< < 1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.