Image security using steganography and cryptography with sweeping computational ghost imaging

被引:1
|
作者
Rajabi-Ghaleh, Sajjad [1 ,2 ,3 ]
Olyaeefar, Babak [1 ,2 ]
Kheradmand, Reza [1 ,2 ,3 ]
Ahmadi-Kandjani, Sohrab [1 ,2 ,3 ]
机构
[1] Univ Tabriz, Res Inst Appl Phys & Astron, Tabriz, Iran
[2] Univ Tabriz, Ctr Photon Excellence, Tabriz, Iran
[3] Univ Tabriz, Fac Phys, Tabriz, Iran
关键词
encryption; correlation coefficient; cryptography; NPCR; NRMS; RSA; steganography; sweeping computational ghost imaging;
D O I
10.3389/fphy.2024.1336485
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A sweeping computational ghost imaging (SCGI)-based encryption system is intended for increased data security and speedier data transport. SCGI is combined with steganography and cryptography processes in this system. SCGI requires fewer shots, resulting in faster image capture, transmission, encryption, and decryption. This strategy also results in smaller, more compact data packages and higher bitrates. Least significant bit (LSB) uses steganography to conceal the hidden picture. In the case of Rivest-Shamir-Adleman (RSA) encryption, public and private keys are generated via a one-way function based on bucket values. Encryption is performed on two levels, with an asymmetric approach divided into three sub-items that significantly increase encryption. Surprisingly, the method uses fewer pictures for image reconstruction, resulting in faster image reconstruction. SCGI promises applications in an extensive number of data encryption sectors since this technology leads to smaller data packages and higher bitrates. The presented approach is examined using the number of pixel change rate (NPCR), normalized root mean square (NRMS), peak signal-to-noise ratio (PSNR), and correlation coefficient (CC), which indicates constant encryption improvement. We experimentally and situationally demonstrate our findings under eavesdropping, which prove the resistance and robustness of our methods. In optimal settings, this innovation enhances encryption by up to 90% when compared to traditional encryption methods.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm
    Shanthakumari, R.
    Malliga, S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (5-6) : 3975 - 3991
  • [32] Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography
    Bin Hureib, Eshraq S.
    Gutub, Adnan A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (08): : 1 - 8
  • [33] Optical image hiding based on computational ghost imaging
    Wang, Le
    Zhao, Shengmei
    Cheng, Weiwen
    Gong, Longyan
    Chen, Hanwu
    OPTICS COMMUNICATIONS, 2016, 366 : 314 - 320
  • [34] Information Security Scheme Based on Computational Temporal Ghost Imaging
    Jiang, Shan
    Wang, Yurong
    Long, Tao
    Meng, Xiangfeng
    Yang, Xiulun
    Shu, Rong
    Sun, Baoqing
    SCIENTIFIC REPORTS, 2017, 7
  • [35] Information Security Scheme Based on Computational Temporal Ghost Imaging
    Shan Jiang
    Yurong Wang
    Tao Long
    Xiangfeng Meng
    Xiulun Yang
    Rong Shu
    Baoqing Sun
    Scientific Reports, 7
  • [36] Secure Medical Image Steganography with RSA Cryptography using Decision Tree
    Jain, Mamta
    Choudhary, Rishabh Charan
    Kumar, Anil
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 291 - 295
  • [37] Visual Cryptography and Image Steganography using Space Filling Hilbert Curves
    Sheidaeian, Hamed
    Abbasifard, Mohammad Reza
    Zolfaghari, Behrouz
    4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING ( ICACTE 2011), 2011, : 763 - 767
  • [38] Secret information hiding in image randomly method using steganography and cryptography
    Hammoud, Awad Kadhim
    Mohaisen, Hatem Nahi
    Mohammed, Mohammed Q.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1283 - 1291
  • [39] The application of cryptography and steganography in the integration of seaport security subsystems
    Ochin, Evgeny
    Dobryakova, Larisa
    Pietrzykowski, Zbigniew
    Borkowski, Piotr
    SCIENTIFIC JOURNALS OF THE MARITIME UNIVERSITY OF SZCZECIN-ZESZYTY NAUKOWE AKADEMII MORSKIEJ W SZCZECINIE, 2011, 26 (98): : 80 - 87
  • [40] Recent advances in multimedia information security: cryptography and steganography
    Abulkasim, Hussein
    Sun, Gengxin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 21865 - 21865