scispace - formally typeset
Search or ask a question
Author

E. Swathika

Bio: E. Swathika is an academic researcher. The author has contributed to research in topics: Confusion and diffusion & Encryption. The author has an hindex of 1, co-authored 1 publications receiving 4 citations.

Papers
More filters
Proceedings ArticleDOI
01 Dec 2019
TL;DR: Experimental results such as Entropy, Histogram analysis, Mean Absolute Error, Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI) proves that the security of the images has been preserved at a higher level and also prevents the unauthorized access to the sensitive information.
Abstract: The age of digital information uses images in fields like military and medical applications, but the security of those transacted images is still a question mark. To overcome this challenge, an efficient encryption system has to be developed which should accomplish confidentiality, integrity, security and it should also prevent the access of images by unauthorized users. Such an image encryption system has to be developed which provides enhanced security for images. This system uses two important techniques which is based on chaos theory namely: Confusion and Diffusion. Confusion part uses block scrambling and modified zigzag transformation while the Diffusion part uses 3D logistic map and key generation followed by additive cipher. This system also protects from statistical and differential attacks. The experimental results such as Entropy, Histogram analysis, Mean Absolute Error, Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI) proves that the security of the images has been preserved at a higher level and also prevents the unauthorized access to the sensitive information.

5 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Results showed that ERSA is able to achieve a more significant security level than RSA, which can be applicable for communications between deep submergence research vehicles.
Abstract: This paper presents a new method for encrypting holographic information based on optical and acoustic signals called a Virtual Optical Holographic Encryption (VOHE) system for underwater communications that can be applicable for communications between deep submergence research vehicles. The transmission medium is composed of a combination of optical signals and acoustic signals together to form the VOHE system for transmitting system information. The optical encryption system provides essential parameters for constructing secure communications such as the propagation wavelength (λ) and focal length (f) of the Fourier lens, which are considered as keys for implementing encryption and decryption processes. An expanded RSA (ERSA) algorithm using a complex function sends system information (λ, f) as a message to a receiver. To determine accuracy of the information retrieved by the proposed technique, the minimum mean square error (MSE) was conducted to evaluate the accuracy of the received signal. The VOHE system employs virtual optical encryption system was simulated based on COMSOL Multiphysics simulation software. Finally, the National Institute of Standards and Technology (NIST) method and Pollard’s rho method were separately applied to evaluate the proposed ERSA algorithm. Obtained results showed that ERSA is able to achieve a more significant security level than RSA.

5 citations

Journal ArticleDOI
Yang Peng1, Tomoyuki Nagase1, Toshiki Kanamoto1, Tsutomu Zeniya1, Shan You 
TL;DR: In this article, the authors presented a new method for encrypting information over a Virtual Optical Holographic Encryption (VOHE) system which employs a virtual optical system based on digital holography and Fourier lens.
Abstract: This paper presents a new method for encrypting information over a Virtual Optical Holographic Encryption (VOHE) system which employs a virtual optical system based on digital holography and Fourier lens The VOHE system provides parameters such as propagation wavelength ( $\lambda$ ) and focal length (f) of the Fourier lens which are keys that are used for encryption and decryption processes The encrypted holographic information is based on an expanded Diffie-Hellman (EDH) algorithm The method of expansion is presented based on a two-dimension complex function EDH-C Furthermore, an expanded Pollard’s Rho method was applied to evaluate the security of the proposed EDH-C algorithm To determine the accuracy of the information retrieved by a receiver site, the mean absolute error (MAE) was calculated between the original code and retrieved code Finally, the randomness of the transmitted message for both methods was evaluated using NIST tests and the results show that the message that was encrypted by the proposed EDH-C algorithm had higher security than DH in view of the unpredictability and complexity of the transmitted message over an insecure channel

3 citations

Journal ArticleDOI
07 Sep 2021
TL;DR: In this paper, a new medical image encryption/decryption algorithm was proposed based on three main parts: the Jigsaw transform, Langton's ant, and a novel way to add deterministic noise.
Abstract: In this work, a new medical image encryption/decryption algorithm was proposed. It is based on three main parts: the Jigsaw transform, Langton’s ant, and a novel way to add deterministic noise. The Jigsaw transform was used to hide visual information effectively, whereas Langton’s ant and the deterministic noise algorithm give a reliable and secure approach. As a case study, the proposal was applied to high-resolution retinal fundus images, where a zero mean square error was obtained between the original and decrypted image. The method performance has been proven through several testing methods, such as statistical analysis (histograms and correlation distributions), entropy computation, keyspace assessment, robustness to differential attack, and key sensitivity analysis, showing in each one a high security level. In addition, the method was compared against other works showing a competitive performance and highlighting with a large keyspace (>1×101,134,190.38). Besides, the method has demonstrated adequate handling of high-resolution images, obtaining entropy values between 7.999988 and 7.999989, an average Number of Pixel Change Rate (NPCR) of 99.5796%±0.000674, and a mean Uniform Average Change Intensity (UACI) of 33.4469%±0.00229. In addition, when there is a small change in the key, the method does not give additional information to decrypt the image.

2 citations

Journal ArticleDOI
10 Mar 2022
TL;DR: In this paper , four variants of Pehlivan-Uyarŏglu chaotic system (PUCS) have been proposed and the properties of the proposed PUCSs are examined through numerical simulations and the parameter values are obtained by observing the bifurcation diagrams for state variables.
Abstract: In this paper, four variants of Pehlivan–Uyarŏglu chaotic system (PUCS) have been proposed. The properties of the proposed PUCSs are examined through numerical simulations and the parameter values are obtained by observing the bifurcation diagrams for state variables. Further, the convergence/divergence of nearby orbits is investigated by noticing the evolution of Lyapunov exponents with time. It is found that the values of Lyapunov exponents are negative, zero and positive for all proposed variants thus confirming the chaoticity of the proposals. The strangeness of the proposed variants is also studied. The stability of PUCS and its proposed variants is examined using Jacobi stability analysis. A current feedback operational amplifier (CFOA) based circuit is put forward that can realize the existing PUCS and its proposed variants, by simply adjusting the component values. The proposed realization is compact (23% saving in overall component count) in comparison to its operational amplifier (OpAmp) based counterpart. The behavior of the proposed variants in time domain, frequency domain and phase space have been examined through simulations in LTspice design environment. Furthermore, the feasibility of the proposed variants is also discussed through presenting the electronic circuit implementation of two of the variants and the results obtained are in good agreement with the LTspice simulations. Monte Carlo (MC) simulations are also included to show the robustness of the proposed circuit against parameter variations.

2 citations

Journal Article
TL;DR: In this paper, the authors present a survey of image encryption techniques and analyze them with respect to various parameters, such as security and performance, key space analysis, correlation coefficient, histogram, information entropy NPCR, UACI etc.
Abstract: In open network, it is important to keep sensitive information secure from becoming vulnerable to unauthorized access. Encryption is used to ensure high security for Images. Chaos has been widely used for image encryption for its different features. There are many chaos based encryption techniques. . Most of the proposed discrete chaotic cryptographic approaches are based on stream or block cipher schemes. If these two schemes are combined the security level is improved. Novel image encryption is proposed based on combination of pixel shuffling .Chaos is used for expand diffusion & confusion in image .Chaotic maps gives advantages of large key space and high level security. We survey exiting work which uses different techniques for image encryption and analyse them with respect to various parameters. To evaluate security & performance, key space analysis, correlation coefficient, histogram, information entropy NPCR, UACI etc. will be studied.

1 citations