Cyber Programming and Analysis

53 views 9:52 am 0 Comments March 12, 2023

Implementation Of Image Encryption

CSCI 5742: Cyber Programming and Analysis – Project Proposal

Spring 2023

 

Introduction :

 

The need to protect the privacy and security of photographs in the modern digital era is what motivates the development of image encryption. Image encryption is more crucial than ever for protecting sensitive data and preserving secrecy in view of the increasing importance of digital privacy.

Although there has been a lot of study done on image encryption, there is still a gap in the literature. Specifically, there is a need for more advanced encryption methods that are capable of handling the expanding size and complexity of image data as well as the rising need for real-time image encryption.

To overcome this gap, our proposed approach aims to design a novel image encryption technique that combines the strengths of existing systems while eliminating their limitations. As part of our strategy, we’ll employ symmetric, asymmetric, and homomorphic encryption. ways to preserve efficiency and real-time capabilities while offering a high level of security.

Cybersecurity practitioners and researchers could benefit from our proposed work by having access to a more efficient and effective picture encryption technique that can handle the rising complexity of images and the demand for real-time encryption. Our method might be applied to a number of situations, including safeguarding private images, private business information, or intellectual property rights. Our research may progress image encryption and improve online privacy and security by filling a knowledge gap in the literature.

Related Works:

The preceding studies in our literature review offer insightful information and expertise about the state of picture encryption algorithms today. The research and methods covered in these papers can be used to guide the creation of our telemedicine project for picture encryption.

For instance, the study by Kaur and Kumar (2018) offers a thorough analysis of different image encryption algorithms and their advantages and disadvantages. This can assist us in deciding which encryption algorithm is best for our project. An image encryption method based on the Arnold transform is presented in the publication by Alsaffar et al. (2020), which can be utilized as a reference implementation for our research. Insights into homomorphic encryption are provided in the Munjal and Bhatia work (2022), which can be utilized to build secure data communication methods for images used in medicine.

Lastly, the quantum logistic image encryption algorithm based on SHA-3 and RSA is suggested in the study by Ye et al. (2021) and can offer a greater level of security for picture encryption. Although if quantum computing is not a part of our project, the approaches and insights presented in this work can help us better comprehend more complex encryption strategies and even spur the creation of brand-new encryption algorithms.

Overall, the articles referenced in our literature research offer insightful information and wisdom that we may use to guide the design and advancement of our telemedicine image encryption project.

References:

M.Kaur & V. Kumar . 24th November 2018. A Comprehensive Review on Image Encryptions Techniques. Publisher: Springer

Retrieved from URL: https://link.springer.com/article/10.1007/s11831-018-9298-8

DM. Alsaffar, AS.Almutiri , B. Aqahtani, RM. Alamri, HF. Alqahtani, NN. Alqahtani, GM. Alshammari, AA.Ali. 21st March 2020. Publisher: IEEE

Retrieved from URL: https://ieeexplore.ieee.org/abstract/document/9096809/authors#authors

K.Munjal & R.Bhatia. A systematic review of homomorphic encryption and its contribution in healthcare industry. 03rd May 2022. Publisher: Springer

Retrieved for URL: https://link.springer.com/article/10.1007/s40747-022-00756-z

 

 

Project Description – Goals, Methods, Platforms :

 

Our image encryption project’s goal is to create an encryption method that strengthens existing methods while fixing their flaws. To provide a high level of security while preserving effectiveness and real-time performance, our method will specifically combine symmetric, asymmetric, and homomorphic encryption algorithms.

We shall use the following strategies to accomplish this objective:

Data Preprocessing: Any metadata or identifying information that could jeopardize the security of the image will be removed from the photographs through preprocessing. This will be accomplished by converting the image to a raw format and eliminating any extraneous data.

Symmetric Encryption: To encrypt the image, we’ll use a symmetric encryption algorithm, like the Advanced Encryption Standard (AES). This method will offer a high level of efficiency and security.

Asymmetric Encryption: The symmetric key used in step 2 will be encrypted using an asymmetric encryption algorithm, such as the RSA algorithm. To use this method will add an extra layer of safety.

Homomorphic Encryption: To enable real-time encryption and decryption of the image, we will use a homomorphic encryption algorithm. This approach removes the need to fully decrypt the image in order to allow authorized persons to access it.

 

We shall use the following platforms forproject’s development:

Python will be used as the primary programming language for creating the encryption system. The popular and flexible programming language Python offers a wide range of frameworks and tools for encryption and image processing.

Running program: We’ll use a Linux-based operating system to construct the system as it provides a high degree of security and adaptability.

Frameworks & Libraries: We’ll use a range of libraries and frameworks for image processing and encryption, including PyCryptodome for encryption and OpenCV for image processing.

As a result, the objective of our Image Encryption project is to combine symmetric, asymmetric, and homomorphic techniques to develop a novel encryption method. The project will be created using Python, a Linux-based operating system, and a number of image processing and encryption modules and frameworks. Our expected outputs include a workable prototype, a technical report, and a research article.

Story Board :

By adding an additional degree of security for sensitive patient data, such as medical images, image encryption can be helpful in the medical industry. Medical photos contain sensitive and private information that must be kept private and are frequently used to diagnose and treat patients.

 

 

 

Doctors can secure patient data from illegal access, hacking, and other security flaws by encrypting medical images. Patient data is kept private because encrypted photos can only be seen by authorized individuals who have the right decryption key.

Image encryption can increase the speed and accuracy of medical diagnostics in addition to supplying security. Medical practitioners and institutions can securely send encrypted photos, enabling collaborative diagnosis and treatment plans without compromising patient confidentiality. Patients who need to consult with specialists or receive care at various facilities may find this to be of particular benefit.

Overall, picture encryption can benefit both patients and medical professionals by protecting the confidentiality of patient information, enhancing the effectiveness and precision of medical diagnosis, and offering a high level of protection for sensitive patient data.

 

Project Timeline:

February 24th March 24th April 24th May 1st
Research & Planning
Implementation
System Development
Testing & Debugging
Feedback, Update & Submission

 

References :

 

G.Ye , K.Jiao & X.Huang. 09th April 2021 . Quantum Logistic image encryption algorithm based on SHA-3 and RSA. Publisher: Springer

Retrieved from URL: https://link.springer.com/article/10.1007/s11071-021-06422-2

The authors suggest a brand-new RSA and SHA-3 combined quantum logistic picture encryption scheme. In contrast to the conventional picture encryption methods’ shortcomings, quantum computing may offer a more secure option, according to the article. The suggested approach creates a logistic map from a chaotic map, then further encrypts the picture data using an S-box. In order to increase the encryption process’ security, the authors also make use of the Grover search technique and quantum key distribution.

 

M.Kaur & V. Kumar . 24th November 2018. A Comprehensive Review on Image Encryptions Techniques. Publisher: Springer

Retrieved from URL: https://link.springer.com/article/10.1007/s11831-018-9298-8

The authors give a summary of numerous image encryption methods, including both traditional and contemporary techniques. The paper analyzes the benefits and drawbacks of each strategy and emphasizes the need of picking the right encryption technique based on the particular requirements of the application.

 

DM. Alsaffar, AS.Almutiri , B. Aqahtani, RM. Alamri, HF. Alqahtani, NN. Alqahtani, GM. Alshammari, AA.Ali. 21st March 2020. Publisher: IEEE

Retrieved from URL: https://ieeexplore.ieee.org/abstract/document/9096809/authors#authors

The authors evaluate various picture encryption strategies, including conventional and cutting-edge ones, and compare their advantages and disadvantages. The obstacles and potential paths for future study in the area of picture encryption are also covered in the paper.

 

K.Munjal & R.Bhatia. A systematic review of homomorphic encryption and its contribution in healthcare industry. 03rd May 2022. Publisher: Springer

Retrieved for URL: https://link.springer.com/article/10.1007/s40747-022-00756-z

The authors concentrate on the use of homomorphic encryption in the medical field. The use of homomorphic encryption in healthcare is discussed in the study along with its potential advantages, including maintaining data confidentiality and privacy while yet enabling data analysis. The constraints and difficulties of adopting homomorphic encryption in the healthcare industry are highlighted by the authors as they assess the state of the research in the area.

 

Compared to our proposed project, Ye et alwork .’s focuses on quantum logistic picture encryption, whereas our proposal aims to build a secure and efficient image encryption algorithm for use in telemedicine. Instead of using quantum computing concepts, our study focuses on improving conventional encryption techniques to meet the demands of the medical industry. Moreover, Ye et alapproach .’s does not directly address the difficulties of securely and promptly delivering huge medical image files, which are addressed in our proposed work. Overall, both papers expand picture encryption methods, although they take distinct approaches to the issue and have different objectives in mind.