TY - GEN
T1 - Securing Image using Triple Data Encryption Standard
AU - Rao, Meghana G.
AU - Cenitta, D.
AU - Arjunan, R. Vijaya
AU - Babu, D. Vijendra
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - This study explores the efficacy of securing images through the implementation of the Triple Data Encryption Standard (TDES). TDES, a symmetric-key block cipher, is examined for its role in enhancing the confidentiality, integrity, and authenticity of sensitive visual data. The encryption process transforms image content into an unreadable format, providing a robust defense against unauthorized access. Additionally, cryptographic checks embedded in TDES contribute to the preservation of data integrity, ensuring that image content remains unaltered during transmission or storage. The study delves into TDES's compliance with industry standards, its flexibility in key management, and cross-platform compatibility. Furthermore, TDES's computational complexity acts as a deterrent against unauthorized access, fortifying its role as a scalable and comprehensive solution for image security. The findings highlight the practical applications of TDES in safeguarding visual data across various contexts, offering insights into its effectiveness in addressing confidentiality concerns and protecting against potential threats.
AB - This study explores the efficacy of securing images through the implementation of the Triple Data Encryption Standard (TDES). TDES, a symmetric-key block cipher, is examined for its role in enhancing the confidentiality, integrity, and authenticity of sensitive visual data. The encryption process transforms image content into an unreadable format, providing a robust defense against unauthorized access. Additionally, cryptographic checks embedded in TDES contribute to the preservation of data integrity, ensuring that image content remains unaltered during transmission or storage. The study delves into TDES's compliance with industry standards, its flexibility in key management, and cross-platform compatibility. Furthermore, TDES's computational complexity acts as a deterrent against unauthorized access, fortifying its role as a scalable and comprehensive solution for image security. The findings highlight the practical applications of TDES in safeguarding visual data across various contexts, offering insights into its effectiveness in addressing confidentiality concerns and protecting against potential threats.
UR - http://www.scopus.com/inward/record.url?scp=85198553839&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85198553839&partnerID=8YFLogxK
U2 - 10.1109/AIIoT58432.2024.10574798
DO - 10.1109/AIIoT58432.2024.10574798
M3 - Conference contribution
AN - SCOPUS:85198553839
T3 - 2024 3rd International Conference on Artificial Intelligence for Internet of Things, AIIoT 2024
BT - 2024 3rd International Conference on Artificial Intelligence for Internet of Things, AIIoT 2024
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
Y2 - 3 May 2024 through 4 May 2024
ER -