LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

CASDC: A Cryptographically Secure Data System Based on Two Private Key Images

Photo from wikipedia

Colored digital images are one of the most important types of digital data to be used in many vital applications, which require a safe way to protect them from hacking… Click to show full abstract

Colored digital images are one of the most important types of digital data to be used in many vital applications, which require a safe way to protect them from hacking operations and the danger of intruders and data thieves. This paper presents an effective and safe method for storing digitally colored images (CASDC). A high level of protection is provided through a complex secret key agreed upon between the sender and the receiver. The secret key consists of nine decimal digits (and can be increased as needed). These digits are processed to extract three values for each color of the three color channels. A left rotation process is performed for the value of each color to produce three new values, where an exclusion process is performed between them to obtain the encrypted value for the color. CASDC is evaluated against a wide range of images to calculate its throughput to show the extent to which this method fulfills encryption and decryption requirements. The Mean Square Error (MSE) values, Peak Signal Noise Ratio (PSNR), and Correlation Coefficient for the three primary channels of the RGB coloring system were analyzed. The practical results of the proposed method are compared with other standard methods such as Data Encryption Standard (DES), Tripple-DES (3DES), Advanced Encryption Standard (AES), and Blow Fish (BF). According to the obtained results, CASDC outperforms all standard methods in terms of efficiency by reducing the time of encryption and decryption and increasing the throughput of the corresponding process. Besides, CASDC is robust against breaks, as the attempts to break the private key will require hundreds of years in the best case.

Keywords: system; private key; cryptographically secure; encryption; images casdc; casdc cryptographically

Journal Title: IEEE Access
Year Published: 2022

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.