Image security using steganography and cryptography with sweeping computational ghost imaging

被引:1
|
作者
Rajabi-Ghaleh, Sajjad [1 ,2 ,3 ]
Olyaeefar, Babak [1 ,2 ]
Kheradmand, Reza [1 ,2 ,3 ]
Ahmadi-Kandjani, Sohrab [1 ,2 ,3 ]
机构
[1] Univ Tabriz, Res Inst Appl Phys & Astron, Tabriz, Iran
[2] Univ Tabriz, Ctr Photon Excellence, Tabriz, Iran
[3] Univ Tabriz, Fac Phys, Tabriz, Iran
关键词
encryption; correlation coefficient; cryptography; NPCR; NRMS; RSA; steganography; sweeping computational ghost imaging;
D O I
10.3389/fphy.2024.1336485
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A sweeping computational ghost imaging (SCGI)-based encryption system is intended for increased data security and speedier data transport. SCGI is combined with steganography and cryptography processes in this system. SCGI requires fewer shots, resulting in faster image capture, transmission, encryption, and decryption. This strategy also results in smaller, more compact data packages and higher bitrates. Least significant bit (LSB) uses steganography to conceal the hidden picture. In the case of Rivest-Shamir-Adleman (RSA) encryption, public and private keys are generated via a one-way function based on bucket values. Encryption is performed on two levels, with an asymmetric approach divided into three sub-items that significantly increase encryption. Surprisingly, the method uses fewer pictures for image reconstruction, resulting in faster image reconstruction. SCGI promises applications in an extensive number of data encryption sectors since this technology leads to smaller data packages and higher bitrates. The presented approach is examined using the number of pixel change rate (NPCR), normalized root mean square (NRMS), peak signal-to-noise ratio (PSNR), and correlation coefficient (CC), which indicates constant encryption improvement. We experimentally and situationally demonstrate our findings under eavesdropping, which prove the resistance and robustness of our methods. In optimal settings, this innovation enhances encryption by up to 90% when compared to traditional encryption methods.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging
    Yuan, Sheng
    Yao, Jianbin
    Liu, Xuemei
    Zhou, Xin
    Li, Zhongyang
    OPTICS COMMUNICATIONS, 2016, 365 : 180 - 185
  • [2] Optical ghost cryptography and steganography
    Liu, Hong-Chao
    Chen, Wen
    OPTICS AND LASERS IN ENGINEERING, 2020, 130
  • [3] Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography
    Seethalakshmi, K. S.
    Usha, B. A.
    Sangeetha, K. N.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 396 - 402
  • [4] Advanced Network Security using Cryptography and Steganography
    Pandey, Jay Kumar
    Kushwaha, Amit
    Srivastava, Vibha
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 326 - 331
  • [5] AN INFORMATION SECURITY SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
    Hossain, Md. Emran
    Grout, Vic
    Bhuiyan, Monir
    Miraz, Mandi H.
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 607 - 608
  • [6] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [7] Research on Equal-resolution Image Hiding Encryption Based on Image Steganography and Computational Ghost Imaging
    Zhang, Leihong
    Zhang, Yiqiang
    Xu, Runchu
    Li, Yangjun
    Zhang, Dawei
    CURRENT OPTICS AND PHOTONICS, 2024, 8 (03) : 270 - 281
  • [8] Multiple layer Text security using Variable block size Cryptography and Image Steganography
    Chauhan, Shivani
    Jyotsna
    Kumar, Janmejai
    Doegar, Amit
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [9] Image steganography with using QR code and cryptography
    Hajduk, Vladimir
    Broda, Martin
    Kovac, Ondrej
    Levicky, Dusan
    PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA 2016), 2016, : 350 - 353
  • [10] High Speed Computational Ghost Imaging via Spatial Sweeping
    Yuwang Wang
    Yang Liu
    Jinli Suo
    Guohai Situ
    Chang Qiao
    Qionghai Dai
    Scientific Reports, 7