Image security using steganography and cryptography with sweeping computational ghost imaging

被引:1
|
作者
Rajabi-Ghaleh, Sajjad [1 ,2 ,3 ]
Olyaeefar, Babak [1 ,2 ]
Kheradmand, Reza [1 ,2 ,3 ]
Ahmadi-Kandjani, Sohrab [1 ,2 ,3 ]
机构
[1] Univ Tabriz, Res Inst Appl Phys & Astron, Tabriz, Iran
[2] Univ Tabriz, Ctr Photon Excellence, Tabriz, Iran
[3] Univ Tabriz, Fac Phys, Tabriz, Iran
关键词
encryption; correlation coefficient; cryptography; NPCR; NRMS; RSA; steganography; sweeping computational ghost imaging;
D O I
10.3389/fphy.2024.1336485
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A sweeping computational ghost imaging (SCGI)-based encryption system is intended for increased data security and speedier data transport. SCGI is combined with steganography and cryptography processes in this system. SCGI requires fewer shots, resulting in faster image capture, transmission, encryption, and decryption. This strategy also results in smaller, more compact data packages and higher bitrates. Least significant bit (LSB) uses steganography to conceal the hidden picture. In the case of Rivest-Shamir-Adleman (RSA) encryption, public and private keys are generated via a one-way function based on bucket values. Encryption is performed on two levels, with an asymmetric approach divided into three sub-items that significantly increase encryption. Surprisingly, the method uses fewer pictures for image reconstruction, resulting in faster image reconstruction. SCGI promises applications in an extensive number of data encryption sectors since this technology leads to smaller data packages and higher bitrates. The presented approach is examined using the number of pixel change rate (NPCR), normalized root mean square (NRMS), peak signal-to-noise ratio (PSNR), and correlation coefficient (CC), which indicates constant encryption improvement. We experimentally and situationally demonstrate our findings under eavesdropping, which prove the resistance and robustness of our methods. In optimal settings, this innovation enhances encryption by up to 90% when compared to traditional encryption methods.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography
    Garg, Priyansha
    Sharma, Moolchand
    Agrawal, Shivani
    Kumar, Yastika
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 71 - 79
  • [22] Analogy of Various DNA Based Security Algorithms Using Cryptography and Steganography
    Jain, Shipra
    Bhatnagar, Vishal
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 285 - 291
  • [23] An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography
    Vijayakumar, P.
    Vijayalakshmi, V.
    Zayaraz, G.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (04) : 1221 - 1242
  • [24] A novel approach for dual layer security of message using Steganography and Cryptography
    Bansal, Reena
    Badal, Neelendra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (15) : 20669 - 20684
  • [25] An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography
    P. Vijayakumar
    V. Vijayalakshmi
    G. Zayaraz
    Wireless Personal Communications, 2016, 89 : 1221 - 1242
  • [26] Enhancing security of images by Steganography and Cryptography techniques
    Bukhari, Sadaf
    Arif, Muhammad Shoaib
    Anjum, M. R.
    Dilbar, Samia
    2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 531 - 534
  • [27] A New Approach for Data Security in Cryptography and Steganography
    Guttikonda, Prashanti
    Kaviti, Sandhya Rani
    Popuri, Ashok Kumar
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 35 - 44
  • [28] Improve Security Using Steganography and Cryptography Based on Smartphone Users Locations
    Ahmed, Anfal Mahmood
    Non, Ahmed Sami
    2022 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, COMPUTING, COMMUNICATION AND SUSTAINABLE TECHNOLOGIES (ICAECT), 2022,
  • [29] Security Improvisation in Image Steganography using DES
    Ramaiya, Manoj Kumar
    Hemrajani, Naveen
    Saxena, Anil Kishore
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1094 - 1099
  • [30] Optical cryptography based on computational ghost imaging and computer-generated holography
    Yu, Xuan
    Chen, Julang
    Wang, Xiaogang
    OPTICS AND LASERS IN ENGINEERING, 2025, 186