Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution

There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems. This model consists of three processes. The first process is the dy...

Full description

Bibliographic Details
Main Authors: Emy Setyaningsih, Retantyo Wardoyo, Anny Kartika Sari
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2020-11-01
Series:Digital Communications and Networks
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2352864819301063
id doaj-e6e5e2ccd56c48f4a5e0ee4c05c1225e
record_format Article
spelling doaj-e6e5e2ccd56c48f4a5e0ee4c05c1225e2021-04-02T16:35:58ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482020-11-0164486503Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distributionEmy Setyaningsih0Retantyo Wardoyo1Anny Kartika Sari2Department of Computer System Engineering, Institut Sains Teknologi AKPRIND, Yogyakarta, Indonesia; Corresponding author.Department of Computer Science and Electronics, Universitas Gadjah Mada, Yogyakarta, Indonesia; Corresponding author.Department of Computer Science and Electronics, Universitas Gadjah Mada, Yogyakarta, IndonesiaThere are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems. This model consists of three processes. The first process is the dynamic symmetric key generation. The second one is the compression process, which is followed by encryption using keystreams and S-Boxes that are generated using a chaotic logistic map. The last process is the symmetric key distribution. The symmetric key is encrypted twice using Rivest-Shamir-Adleman (RSA) to provide both authentication and confidentiality. Then, it is inserted into the cipher image using the End of File (EoF) method. The evaluation shows that the symmetric key generator model can produce a random and dynamic symmetric key. Hence, the image data is safe from ciphertext-only attacks. This model is fast and able to withstand entropy attacks, statistical attacks, differential attacks, and brute-force attacks.http://www.sciencedirect.com/science/article/pii/S2352864819301063Compression-encryptionS-BoxChaotic logistic mapEnd of fileSymmetric key distribution
collection DOAJ
language English
format Article
sources DOAJ
author Emy Setyaningsih
Retantyo Wardoyo
Anny Kartika Sari
spellingShingle Emy Setyaningsih
Retantyo Wardoyo
Anny Kartika Sari
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution
Digital Communications and Networks
Compression-encryption
S-Box
Chaotic logistic map
End of file
Symmetric key distribution
author_facet Emy Setyaningsih
Retantyo Wardoyo
Anny Kartika Sari
author_sort Emy Setyaningsih
title Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution
title_short Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution
title_full Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution
title_fullStr Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution
title_full_unstemmed Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution
title_sort securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution
publisher KeAi Communications Co., Ltd.
series Digital Communications and Networks
issn 2352-8648
publishDate 2020-11-01
description There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems. This model consists of three processes. The first process is the dynamic symmetric key generation. The second one is the compression process, which is followed by encryption using keystreams and S-Boxes that are generated using a chaotic logistic map. The last process is the symmetric key distribution. The symmetric key is encrypted twice using Rivest-Shamir-Adleman (RSA) to provide both authentication and confidentiality. Then, it is inserted into the cipher image using the End of File (EoF) method. The evaluation shows that the symmetric key generator model can produce a random and dynamic symmetric key. Hence, the image data is safe from ciphertext-only attacks. This model is fast and able to withstand entropy attacks, statistical attacks, differential attacks, and brute-force attacks.
topic Compression-encryption
S-Box
Chaotic logistic map
End of file
Symmetric key distribution
url http://www.sciencedirect.com/science/article/pii/S2352864819301063
work_keys_str_mv AT emysetyaningsih securingcolorimagetransmissionusingcompressionencryptionmodelwithdynamickeygeneratorandefficientsymmetrickeydistribution
AT retantyowardoyo securingcolorimagetransmissionusingcompressionencryptionmodelwithdynamickeygeneratorandefficientsymmetrickeydistribution
AT annykartikasari securingcolorimagetransmissionusingcompressionencryptionmodelwithdynamickeygeneratorandefficientsymmetrickeydistribution
_version_ 1721556190073192448