{"title":"Enhanced Visual Cryptosystem Using BLAKE2 Hash Algorithm","authors":"A. Bhuvaneshwari, P. Kaythry","doi":"10.1109/IAICT59002.2023.10205901","DOIUrl":null,"url":null,"abstract":"Many physical devices in everyday life have been connected to the global web since its inception. The network’s security improves as the number of items connected to it grows. However, current security measures make progress difficult. As a result, based on the BLAKE 2 hash algorithm, we propose a basic security mechanism. Our proposed method aims to improve the transfer of sensitive image data between nodes. The key issue is transmitting data across multiple nodes invisibly without being hacked. The proposed system’s primary objective is to maintain the picture secure and safe from third parties. It is accomplished by combining encryption and decryption into a lightweight image transport technique. It describes a technique for generating secret cryptographic keys from image pixels using the BLAKE 2 cryptographic hash that is image content adaptive. This scheme includes three encryption processes: DC coefficient encryption, AC coefficient encryption, and novel orthogonal transformation. The encrypted image is safely sent to another node over the network using an upgraded visual cryptosystem, and the decrypted image is successfully obtained at the receiver node.","PeriodicalId":339796,"journal":{"name":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAICT59002.2023.10205901","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Many physical devices in everyday life have been connected to the global web since its inception. The network’s security improves as the number of items connected to it grows. However, current security measures make progress difficult. As a result, based on the BLAKE 2 hash algorithm, we propose a basic security mechanism. Our proposed method aims to improve the transfer of sensitive image data between nodes. The key issue is transmitting data across multiple nodes invisibly without being hacked. The proposed system’s primary objective is to maintain the picture secure and safe from third parties. It is accomplished by combining encryption and decryption into a lightweight image transport technique. It describes a technique for generating secret cryptographic keys from image pixels using the BLAKE 2 cryptographic hash that is image content adaptive. This scheme includes three encryption processes: DC coefficient encryption, AC coefficient encryption, and novel orthogonal transformation. The encrypted image is safely sent to another node over the network using an upgraded visual cryptosystem, and the decrypted image is successfully obtained at the receiver node.