一种基于一维逻辑映射的改进RSA图像加密算法

H. J. Yakubu, T. Aboiyar, P. B. Zirra
{"title":"一种基于一维逻辑映射的改进RSA图像加密算法","authors":"H. J. Yakubu, T. Aboiyar, P. B. Zirra","doi":"10.31838/ijccts/04.01.01","DOIUrl":null,"url":null,"abstract":"The need to have a more secured ways of protecting sensitive images in this modern age of technology has become necessary \nfor ensuring that such images sent via the insecure public network called the Internet are protected from attacks. To this end, various \nimage encryption algorithms have been proposed by many researchers and RSA image encryption algorithm is one of them. Studies on \nRSA image encryption algorithm reveal that some images when encrypted using the algorithm, gives encrypted images that do expose \nsome features of the plain images on visual inspection no matter the size of primes used. This is due to the fact that digital images have \nhigh redundancy and high correlation of image data that make RSA algorithm image dependent. Cryptanalysis has been a major source \nof concern (in particular the brute-force attack) when designing a cryptosystem since it is assumed that the cryptanalyst knows exactly \nthe design and working of the cryptosystem under study except the secret key. Thus, making the secret key access much more difficult to \nthe cryptanalyst makes the encryption algorithm a more reliable one. In view of these, an improved RSA image encryption algorithm \nusing 1-D logistic map was proposed. The proposed scheme has two stages. In the first stage, the plain-image is shuffled using the chaotic \nproperties of the map and in the second stage; the shuffled image is encryption using the RSA algorithm. The proposed algorithm and \nthe RSA algorithm were tested on two standard test gray scale images: cameraman.tif and clock.tif using four different set of keys. Security \nanalysis such as histogram analysis and correlation coefficient analysis were also carried out on the results obtained from the two \nmethods. The results of the analysis show that the proposed scheme is more secured and stronger against the brute-force attack ( encrypted \nimage which does not reveals any hint about the plain image to the attacker and also its key space has double: the two primes, \ninitial condition and control parameter) than the RSA image encryption scheme.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"26 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An improved RSA image encryption algorithm using 1-D logistic map\",\"authors\":\"H. J. Yakubu, T. Aboiyar, P. B. Zirra\",\"doi\":\"10.31838/ijccts/04.01.01\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The need to have a more secured ways of protecting sensitive images in this modern age of technology has become necessary \\nfor ensuring that such images sent via the insecure public network called the Internet are protected from attacks. To this end, various \\nimage encryption algorithms have been proposed by many researchers and RSA image encryption algorithm is one of them. Studies on \\nRSA image encryption algorithm reveal that some images when encrypted using the algorithm, gives encrypted images that do expose \\nsome features of the plain images on visual inspection no matter the size of primes used. This is due to the fact that digital images have \\nhigh redundancy and high correlation of image data that make RSA algorithm image dependent. Cryptanalysis has been a major source \\nof concern (in particular the brute-force attack) when designing a cryptosystem since it is assumed that the cryptanalyst knows exactly \\nthe design and working of the cryptosystem under study except the secret key. Thus, making the secret key access much more difficult to \\nthe cryptanalyst makes the encryption algorithm a more reliable one. In view of these, an improved RSA image encryption algorithm \\nusing 1-D logistic map was proposed. The proposed scheme has two stages. In the first stage, the plain-image is shuffled using the chaotic \\nproperties of the map and in the second stage; the shuffled image is encryption using the RSA algorithm. The proposed algorithm and \\nthe RSA algorithm were tested on two standard test gray scale images: cameraman.tif and clock.tif using four different set of keys. Security \\nanalysis such as histogram analysis and correlation coefficient analysis were also carried out on the results obtained from the two \\nmethods. The results of the analysis show that the proposed scheme is more secured and stronger against the brute-force attack ( encrypted \\nimage which does not reveals any hint about the plain image to the attacker and also its key space has double: the two primes, \\ninitial condition and control parameter) than the RSA image encryption scheme.\",\"PeriodicalId\":415674,\"journal\":{\"name\":\"International Journal of communication and computer Technologies\",\"volume\":\"26 2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of communication and computer Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31838/ijccts/04.01.01\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of communication and computer Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31838/ijccts/04.01.01","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

在这个现代技术时代,需要有一种更安全的方式来保护敏感图像,以确保通过称为Internet的不安全公共网络发送的此类图像免受攻击。为此,许多研究者提出了各种各样的图像加密算法,RSA图像加密算法就是其中之一。对RSA图像加密算法的研究表明,某些图像在使用该算法加密时,无论使用的素数大小如何,加密后的图像在视觉上都暴露了普通图像的一些特征。这是由于数字图像具有高冗余性和图像数据的高相关性,使得RSA算法依赖于图像。在设计密码系统时,密码分析一直是一个主要的关注点(特别是暴力攻击),因为它假设密码分析师确切地知道所研究的密码系统的设计和工作原理,除了密钥。因此,使密码学家更难访问密钥使加密算法更加可靠。鉴于此,提出了一种改进的基于一维逻辑映射的RSA图像加密算法。拟议的计划分为两个阶段。在第一阶段,利用地图的混沌特性对图像进行洗牌,在第二阶段;打乱后的图像使用RSA算法进行加密。在cameraman.tif和clock.tif两个标准测试灰度图像上使用四组不同的密钥对所提出的算法和RSA算法进行了测试。并对两种方法得到的结果进行了直方图分析、相关系数分析等安全性分析。分析结果表明,与RSA图像加密方案相比,该方案具有更高的安全性和更强的抗暴力攻击能力(加密图像不会向攻击者透露任何关于明文图像的线索,并且其密钥空间具有两倍:两个素数、初始条件和控制参数)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An improved RSA image encryption algorithm using 1-D logistic map
The need to have a more secured ways of protecting sensitive images in this modern age of technology has become necessary for ensuring that such images sent via the insecure public network called the Internet are protected from attacks. To this end, various image encryption algorithms have been proposed by many researchers and RSA image encryption algorithm is one of them. Studies on RSA image encryption algorithm reveal that some images when encrypted using the algorithm, gives encrypted images that do expose some features of the plain images on visual inspection no matter the size of primes used. This is due to the fact that digital images have high redundancy and high correlation of image data that make RSA algorithm image dependent. Cryptanalysis has been a major source of concern (in particular the brute-force attack) when designing a cryptosystem since it is assumed that the cryptanalyst knows exactly the design and working of the cryptosystem under study except the secret key. Thus, making the secret key access much more difficult to the cryptanalyst makes the encryption algorithm a more reliable one. In view of these, an improved RSA image encryption algorithm using 1-D logistic map was proposed. The proposed scheme has two stages. In the first stage, the plain-image is shuffled using the chaotic properties of the map and in the second stage; the shuffled image is encryption using the RSA algorithm. The proposed algorithm and the RSA algorithm were tested on two standard test gray scale images: cameraman.tif and clock.tif using four different set of keys. Security analysis such as histogram analysis and correlation coefficient analysis were also carried out on the results obtained from the two methods. The results of the analysis show that the proposed scheme is more secured and stronger against the brute-force attack ( encrypted image which does not reveals any hint about the plain image to the attacker and also its key space has double: the two primes, initial condition and control parameter) than the RSA image encryption scheme.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analysing Retinal Disease Using Cleha and Thresholding Design and implementation of Triple Frequency Microstrip patch antenna for 5G communications Millimeter-Wave Power Amplifier ICs for High Dynamic Range Signals Gsm Adapted Electric Lineman Safety System With Protection Based Circuit Breaker An Intelligent System For Toddler Cry Detection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1