Introducing real-time image encryption technology using key vault, various transforms, and phase masks

Poonam Yadav,Hukum Singh,Kavita Khanna
DOI: https://doi.org/10.1007/s11042-023-14715-4
IF: 2.577
2023-03-30
Multimedia Tools and Applications
Abstract:In today’s world achieving safe and efficient image transmission is a major issue. The image is encrypted by using some encryption technique and each algorithm has its strengths and weaknesses no single encryption mechanism can get the maximum security with minimum execution time. This paper proposes that it is possible to develop a Real-Time encryption algorithm system that uses multiple encryption algorithms in one system and provides adequate means of efficiency with security. In this system, we introduce a key vault that holds information of multiple encryption algorithms with a unique key. For every input image, the system selects a random algorithm for encryption from the key vault, encrypts the image with the selected encryption algorithm, and attached the key generated in the key vault to the encrypted image. At the receiver end first, we find out the key to identify the algorithm by which the image is encrypted, then get encryption algorithm details and perform decryption accordingly. We can increase the rate of its difficulty to improve its resistance against attacks by adding more and more encryption algorithms. It is quite impossible to break the proposed encryption technique as it randomly changes the encryption algorithm for each input image in randomly at run-time. The proposed cryptosystem can resist most of the existing attacks, as proved by using performance metrics and results. The aim is to provide a more secure image encryption system with reasonable computational complexity. This project has been implemented, key vault in ASP.NET and transforms and masks in MATLAB (2019a). Experiments confirm the feasibility and efficiency of the proposed real-time encryption system.
computer science, information systems, theory & methods,engineering, electrical & electronic, software engineering
What problem does this paper attempt to address?