TY - GEN
T1 - Comparison of Encryption Techniques to Encrypt Private Parts of an Image
AU - Shetty, Nisha P.
AU - Muniyal, Balachandra
AU - Kaithi, Rithish Reddy
AU - Yemma, Sarath Chandra Reddy
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
PY - 2022
Y1 - 2022
N2 - This article compares two methods for encrypting private information of the image and to make the image data highly secure. One method implements the advanced least significant bit (LSB) steganography, AES encryption, and RSA algorithm by matching data to an image, and there is much less chance of an attacker having the capacity to apply steganography analysis to recover original data. Before concealing the key in an image encrypted using AES algorithm with same key, the application first encrypts it using RSA and LSB methods (Moumen and Sissaoui in Nonlinear Engineering 6:53–59, 2017 [1]). The other method implements an image encryption algorithm derived from SHA-512 (Seyedzade, et al. in Iranian conference on machine vision and image processing, No. 5941167, 2010 [2]). In this algorithm, first equal half of data in image is used to encrypt opposite half of the image reciprocally. In order to assess performance, both the algorithms are examined to analyze the measure of the security, quality, and efficiency. These assessments consist of histogram analysis, coefficient of correlation analysis, information entropy analysis, degree of quality in encryption.
AB - This article compares two methods for encrypting private information of the image and to make the image data highly secure. One method implements the advanced least significant bit (LSB) steganography, AES encryption, and RSA algorithm by matching data to an image, and there is much less chance of an attacker having the capacity to apply steganography analysis to recover original data. Before concealing the key in an image encrypted using AES algorithm with same key, the application first encrypts it using RSA and LSB methods (Moumen and Sissaoui in Nonlinear Engineering 6:53–59, 2017 [1]). The other method implements an image encryption algorithm derived from SHA-512 (Seyedzade, et al. in Iranian conference on machine vision and image processing, No. 5941167, 2010 [2]). In this algorithm, first equal half of data in image is used to encrypt opposite half of the image reciprocally. In order to assess performance, both the algorithms are examined to analyze the measure of the security, quality, and efficiency. These assessments consist of histogram analysis, coefficient of correlation analysis, information entropy analysis, degree of quality in encryption.
UR - http://www.scopus.com/inward/record.url?scp=85134341275&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85134341275&partnerID=8YFLogxK
U2 - 10.1007/978-981-19-1111-8_40
DO - 10.1007/978-981-19-1111-8_40
M3 - Conference contribution
AN - SCOPUS:85134341275
SN - 9789811911101
T3 - Lecture Notes in Electrical Engineering
SP - 535
EP - 557
BT - Advances in Electrical and Computer Technologies - Select Proceedings of ICAECT 2021
A2 - Sengodan, Thangaprakash
A2 - Murugappan, M.
A2 - Misra, Sanjay
PB - Springer Science and Business Media Deutschland GmbH
T2 - International Conference on Advances in Electrical and Computer Technologies, ICAECT 2021
Y2 - 29 October 2021 through 30 October 2021
ER -