Image processing-based protection of privacy data in cloud using NTRU algorithm

被引:0
作者
Karthika, K. [1 ]
Priya, R. Devi [2 ]
机构
[1] Anna Univ, Chennai, India
[2] KPR Inst Engn & Technol, Dept Comp Sci & Engn, Coimbatore, Tamilnadu, India
关键词
Gray level co-occurrence matrix (GLCM); NTRU; Gaussian filter; Encryption; Decryption; ENCRYPTION;
D O I
10.1007/s11760-024-03008-4
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The recent and fast improvements in communication networks and digital technologies have facilitated the easy transmission and storage of multimedia information on various network platforms. However, in today's research, issues relating to the safety concerned with the large amount of information have emerged as a crucial topic due to the internet openings. Since images are regarded as significant components of network communication, the information security of images is highly vital. In this paper, an image processing concept along with authenticated cloud storage is proposed which includes the enhanced processing of input images and their secured storage. The processed input images undergo authentication procedures in which the algorithm used to encrypt and decrypt the image information is the Nth Degree Truncated Polynomial Ring Unit (NTRU). It performs a rapid generation of 128 bit private key and verification achieving improved performance and thereby preventing the unauthorized access of information. The processed image is encrypted and stored in the cloud using the proposed algorithm. Only an authorized person is permitted to do accessible secret measures to decrypt the document from the cloud. Meanwhile, the proposed schemes show more efficient and secure one to analyze the security, which are done in the assessment of performance of the system generating improved values of peak signal-to-noise ratio (PSNR) and mean-square error (MSE) indicating 5.24 and 82.10, respectively. The proposed work exhibits an average encryption time of 12.075 s and decryption time of 16.2 s, respectively.
引用
收藏
页码:4003 / 4018
页数:16
相关论文
共 34 条
[1]   A new chaos based color image encryption algorithm using permutation substitution and Boolean operation [J].
Ali, Tahir Sajjad ;
Ali, Rashid .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (27-28) :19853-19873
[2]  
Anitha V., 2012, Int. J. Commun. Netw. Secur, V1, P5, DOI DOI 10.47893/IJCNS.2012.1042
[3]  
Ankit K, 2016, INDIAN J SCI TECHNOL, V9, DOI [10.17485/ijst/2016/v9i22/95288, DOI 10.17485/ijst/2016/v9i22/95288]
[4]   Fingerprint-based crypto-biometric system for network security [J].
Barman, Subhas ;
Samanta, Debasis ;
Chattopadhyay, Samiran .
EURASIP JOURNAL ON INFORMATION SECURITY, 2015, 2015 (01)
[5]  
Chen Yang, 2010, Proceedings of the Third International Joint Conference on Computational Sciences and Optimization (CSO 2010), P387, DOI 10.1109/CSO.2010.212
[6]   A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map [J].
Chen, Yong ;
Xie, Shucui ;
Zhang, Jianzhong .
ENTROPY, 2022, 24 (02)
[7]  
Dwivedi R., 2018, ARXIV PREPRINT ARXIV, P1805
[8]   OTPaaS-One Time Password as a Service [J].
Erdem, Emir ;
Sandikkaya, Mehmet Tahir .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) :743-756
[9]  
Gaddam S V K, 2010, IJ NETWORK SECURITY, V11, P61
[10]   Visually meaningful image encryption algorithm based on digital signature [J].
Huang, Xiaoling ;
Dong, Youxia ;
Ye, Guodong ;
Yap, Wun-She ;
Goi, Bok-Min .
DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (01) :159-165