Mulvaney_17tr100191 djm latest.pdf (736.46 kB)
Encryption of images file using a user controlled automatically-generated key
conference contribution
posted on 2019-06-17, 08:35 authored by Halima Abdul halime Shnishah, David MulvaneyTraditional symmetrical cryptographic
algorithms generally provide an adequate degree of immunity
to attacks aimed at revealing secret keys. A number of
approaches exist for the automated generation of secret keys,
but, for high security applications, some end users remain
wary of approaches that are controlled by third parties.
Consequently, there remains interest in certain high-security
applications in being able to retain control over the method
used for the generation of keys. In this paper, keys for both
cipher images, decryption images are obtained using the
evolutionary computing tool Eureqa, in its modelling of
pseudo-random input data. The secret keys generated by this
approach and when applied to the encryption and decryption
of gray-scale images are validated in a range of statistical tests,
namely histogram, chi-square, correlation of adjacent pixel
pairs, correlation between original and encrypted images,
entropy and key sensitivity. Experimental results obtained
from methods show that the proposed image encryption and
decryption algorithms are secure and reliable, with the
potential to be adapted to high-security image communication
applications.
History
School
- Mechanical, Electrical and Manufacturing Engineering
Published in
2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE)Pages
17 - 22Citation
SHNISHAH, H.A.H. and MULVANEY, D., 2018. Encryption of images file using a user controlled automatically-generated key. Presented at the 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, 16-17 Aug., pp. 17 - 22.Publisher
© IEEEVersion
- NA (Not Applicable or Unknown)
Publication date
2018Notes
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.ISBN
9781538649046Publisher version
Language
- en