Abstract: The advancements in internet and 5G communication technologies enormously use images as a crucial element for effective digital communication. Most of the digital devices support image communication as a prominent way of communication in digital Era. Most of the unauthorized access of digital Era communications leads to serious issues in digital data or digital image communications. Hence, Image Security in digital communication becomes an egress area of research in Digital Era. This paper is to design and implement an algorithm with a 96 bits cryptographic system. The result analysis carries out in this paper on input images and presents the comparative analysis of our proposed algorithm with the standard algorithmsthrough standard performance evaluation metrics. then following two keys, each of 16-bits, are generated. Key 1 (16-bit) -0 0 1 1 1 0 0 1 0 1 0 0 0 0 1 1 Key 2 (16 -bit) -0 0 1 0 0 1 0 0 0 0 0 1 0 0 1 1 And when encryption is done by using 64-bit symmetric SF key then following four keys, each of 16-bits, are generated. Key 1 (16-bit) -0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 Key 2 (16 -bit) -0 0 0 0 0 0 1 1 1 0 0 0 0 1 1 1 Key 3 (16-bit) -0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Key 4 (16 -bit) -1 1 1 0 0 1 0 1 0 0 1 0 1 0 0 1 Finally when encryption is done by using 96-bit symmetric SF key then following six keys, each of 16-bits, are generated. Key 1 (16-bit) -0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 Key 2 (16 -bit) -0 0 0 0 0 0 1 1 1 0 0 0 0 1 1 1 Key 3 (16-bit) -0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Key 4 (16 -bit) -1 1 1 0 0 1 0 1 0 0 1 0 1 0 0 1 Key 5 (16 -bit)-0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Key 6 (16 -bit) -1 1 1 1 0 0 0 0 1 1 1 1 0 0 0 0 The performance analysis for different parameter to be performs on various images like Lena, Baboon and Under Water image. Table II indicates that 32-bits, 64-bits and 96-bits encryption. It is finding that the 96-bits encryption algorithm based on secure force is better than other encryption algorithm. Figure 3 shows the histogram analysis of original image and encrypted image using 32-bit key, 64-bit key and 96-bit key based on secure force algorithm. Figure 4 shows horizontal, vertical and diagonal correlation between original image and encrypted Lena image using 32-bit key, 64-bit key and 96-bit key based on secure force algorithm. A. AnalysisThe results obtained from experiments confirmed that the proposed 96-bit secure force algorithm performs better than other algorithms [20][21][22][23][24][25][26][27][28] in terms of NPCR and UACI. From the comparison charts shown in Table III based on NPCR and UACI, we conclude that our proposed algorithm is almost better than existing algorithms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.