Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
Main Article Content
Abstract
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to a subsystem consisting of an Reversible Logic Gate (RLG) group to obtain the secret keys that are passed to Rivest Shamir Adleman (RSA) to finish encrypting the image. The results indicate that the proposed method has the ability to generate a very large set of highly complex and secure secret keys that can be used later in the encryption stage. Moreover, the number and complexity of those keys will change each time the image is changed, and this represents the contribution of the proposed method. They experienced no time loss throughout the encryption and decryption processes when using RLG, which indicates that the proposed system did a good job in making different keys from the same image. And it differs in the strength of the key from one image to another, depending on the nature of the color imge.
Received 08/03/2023
Revised 06/10/2023
Accepted 08/10/2023
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
Ahmed KS, Mohammed HA, Ahmed HM. A New Chaotic Image Cryptosystem Based On Plaintext-Associated Mechanism and Integrated Confusion-Diffusion Operation. Karbala Int J Mod Sci. 2021; 7(3): 176-188. https://doi.org/10.33640/2405-609X.3117
Ahmed HM, Ahmed K, Mohammed H. Image Cryptosystem for IOT Devices Using 2-D Zaslavsky Chaotic Map. TEM J. 2022 ; 15(2): 543-553. https://doi.org/10.22266/ijies2022.0430.48.
Rawaa MA, Mohammed AH, Amal AK. Detecting Phishing Cyber Attack Based On Fuzzy Rules And Differential Evaluation. J Assoc Inf Sci Technol. 2022; 11(2): 543-551. https://doi.org/10.18421/TEM112-07.
Ekhlas Abbas Al-Bahrani, Riyam N.J Kadhum. A New Cipher Based on Feistel Structure and Chaotic Maps. Baghdad Sci J. 2019 ; 16 (1): 270-280. https://dx.doi.org/10.21123/bsj.2019.16.1.
Amal AM, Zahraa SD, Raniah AM. Image Confusion and Diffusion Based On Multi-Chaotic System and Mix-Column. Bull Electr Eng Inform. 2021; 10(4): 2100-2109. https://doi.org/10.11591/eei.v10i42924.
Abbas EA, Karam TA, Abbas AK. Image Cipher System Based On RSA and Chaotic Maps. Eurasian J Math Comput Appl. 2019; 7(4): 2019 4 – 17. https://doi.org/10.32523/2306-6172-2019-7-4-4-17.
Ekhlas A, Riyam NJ. A New Cipher Based on Feistel Structure and Chaotic Maps. Baghdad Sci J. 2019; 16(1): 270-280. https://doi.org/10.21123/bsj.2019.16.1(Suppl.).0270.
Jabbar KK, Tuieb MB, Thajeel SA. Digital Watermarking By Utilizing The Properties Of Self-Organization Map Based On Least Significant Bit And Most Significant Bit. Int J Electr Comput Eng. 2021; 12(6): 6545–6558. https://doi.org/10.11591/ijece.v12i6.pp6545-6558.
Shailaja A, Krishnamurthy GN. FPGA Implementation and Analysis of RC7 Algorithm Using Reversible Logic Gates. Int J Eng Adv Technol [Internet]. 2019; 8 (6): 769-776. https://doi.org/10.35940/ijeat.F7993.088619.
Geethu C, Helen MM, Anjana G. VLSI Implementation of Image Encryption and Decryption Using Reversible Logic Gates. Int Conf Power Electron Renew Energ Appl. 2020; 16 (1): 30-30. https://doi.org/10.1109/PEREA51218.2020.9339781.
Mehran MK, Kaj RA, Siavash BS. Fault Resilient Lightweight Cryptography Block Cipher For Secure Embedded Systems. IEEE Embed Syst Lett. 2014; 6(4): 89–92. https://doi.org/10.1109/LES.2014.2365099.
Jabbar, KK, Ghozzi F, Fakhfakh A. Property Comparison of Intellectual Property Rights of Image - Based on Encryption Techniques. TEM J. 2023; 12(1): 529–539. https://doi.org/10.18421/TEM121-63.
Z. HA, Guosheng WA, NG. Jain. Security Analysis and Enhanced Design of a Dynamic Block Cipher. China Commun. 2016; 13(1): 150–160. https://doi.org/10.1109/cc.2016.7405712.
Srivatsam S, Mehran MK, Reza A, Mehrdad N. Reliable Hardware Architectures For Cryptographic Block Ciphers LED and HIGHT. IEEE Trans Comput-Aided Des. 2017; 36(10): 1750-1758. https://doi.org/10.1109/tcad.2017.2661811.
Vinoth R, Siva J, Sundararaman R, Rengarajan A. Security Analysis of Reversible Logic Cryptography Design with LFSR Key on 32-Bit Microcontroller. Microprocess Microsyst. 2021; 84: 1750-1758. https://doi.org/10.1016/j.micpro.2021.104265.
Falowo O, Sanjay M, Falayi F, Olusola A, Gokhan S. An Improved Random Bit-Stuffing Technique with a Modified RSA Algorithm for Resisting Attacks in Information Security (RBMRSA). Egypt Inform J. 2022; 23(84): 291–301. https://doi.org/10.1016/j.eij.2022.02.001.
Mohammed HA, Ahmed KS, Fadhil HA. An Efficient Confusion-Diffusion Structure For Image Encryption Using Plain Image Related Henon Map. Int J Comput. 2020; 19(2): 1-3. https://doi.org/10.47839/ijc.19.3.1895.
Enas FK, Eklilas FN, Alaa NM. Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy. Baghdad Sci J. 2022; 19 (6): 1378-1386. https://doi.org/10.21123/bsj.2022.6398
Mukesh S, Marwan AS, Yoshua B.Scalable Neural Network Algorithms for High Dimensional Data. J Big Data . 2023: 1–12. https://doi.org/10.58496/MJBD/2023/001.