Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution
There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems. This model consists of three processes. The first process is the dy...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
KeAi Communications Co., Ltd.
2020-11-01
|
Series: | Digital Communications and Networks |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2352864819301063 |
id |
doaj-e6e5e2ccd56c48f4a5e0ee4c05c1225e |
---|---|
record_format |
Article |
spelling |
doaj-e6e5e2ccd56c48f4a5e0ee4c05c1225e2021-04-02T16:35:58ZengKeAi Communications Co., Ltd.Digital Communications and Networks2352-86482020-11-0164486503Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distributionEmy Setyaningsih0Retantyo Wardoyo1Anny Kartika Sari2Department of Computer System Engineering, Institut Sains Teknologi AKPRIND, Yogyakarta, Indonesia; Corresponding author.Department of Computer Science and Electronics, Universitas Gadjah Mada, Yogyakarta, Indonesia; Corresponding author.Department of Computer Science and Electronics, Universitas Gadjah Mada, Yogyakarta, IndonesiaThere are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems. This model consists of three processes. The first process is the dynamic symmetric key generation. The second one is the compression process, which is followed by encryption using keystreams and S-Boxes that are generated using a chaotic logistic map. The last process is the symmetric key distribution. The symmetric key is encrypted twice using Rivest-Shamir-Adleman (RSA) to provide both authentication and confidentiality. Then, it is inserted into the cipher image using the End of File (EoF) method. The evaluation shows that the symmetric key generator model can produce a random and dynamic symmetric key. Hence, the image data is safe from ciphertext-only attacks. This model is fast and able to withstand entropy attacks, statistical attacks, differential attacks, and brute-force attacks.http://www.sciencedirect.com/science/article/pii/S2352864819301063Compression-encryptionS-BoxChaotic logistic mapEnd of fileSymmetric key distribution |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Emy Setyaningsih Retantyo Wardoyo Anny Kartika Sari |
spellingShingle |
Emy Setyaningsih Retantyo Wardoyo Anny Kartika Sari Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution Digital Communications and Networks Compression-encryption S-Box Chaotic logistic map End of file Symmetric key distribution |
author_facet |
Emy Setyaningsih Retantyo Wardoyo Anny Kartika Sari |
author_sort |
Emy Setyaningsih |
title |
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution |
title_short |
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution |
title_full |
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution |
title_fullStr |
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution |
title_full_unstemmed |
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution |
title_sort |
securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution |
publisher |
KeAi Communications Co., Ltd. |
series |
Digital Communications and Networks |
issn |
2352-8648 |
publishDate |
2020-11-01 |
description |
There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems. This model consists of three processes. The first process is the dynamic symmetric key generation. The second one is the compression process, which is followed by encryption using keystreams and S-Boxes that are generated using a chaotic logistic map. The last process is the symmetric key distribution. The symmetric key is encrypted twice using Rivest-Shamir-Adleman (RSA) to provide both authentication and confidentiality. Then, it is inserted into the cipher image using the End of File (EoF) method. The evaluation shows that the symmetric key generator model can produce a random and dynamic symmetric key. Hence, the image data is safe from ciphertext-only attacks. This model is fast and able to withstand entropy attacks, statistical attacks, differential attacks, and brute-force attacks. |
topic |
Compression-encryption S-Box Chaotic logistic map End of file Symmetric key distribution |
url |
http://www.sciencedirect.com/science/article/pii/S2352864819301063 |
work_keys_str_mv |
AT emysetyaningsih securingcolorimagetransmissionusingcompressionencryptionmodelwithdynamickeygeneratorandefficientsymmetrickeydistribution AT retantyowardoyo securingcolorimagetransmissionusingcompressionencryptionmodelwithdynamickeygeneratorandefficientsymmetrickeydistribution AT annykartikasari securingcolorimagetransmissionusingcompressionencryptionmodelwithdynamickeygeneratorandefficientsymmetrickeydistribution |
_version_ |
1721556190073192448 |