Javascript must be enabled to continue!
Triple Encryption of Images based on RC4, Zigzag, and Elliptic Curve Algorithms for Enhanced Security
View through CrossRef
The security of digital images is of paramount importance in today's digital world. Encryption is a technique used to secure digital images from unauthorized access. The encryption technique transforms the original image into a scrambled form, which is unreadable to anyone without the proper decryption key. Several encryption techniques have been proposed to secure digital images, including DES, AES, RSA, and ECC. These methods, however, are susceptible to side-channel and brute-force attacks. Hence, new encryption methods that offer more security are required. The new multi-encryption algorithm for secure digital image encryption is presented in this research. The suggested approach combines the RC4, Zigzag transformation, and Elliptic Curve Cryptography (ECC) algorithms to increase the security of picture encryption. Data is encrypted using the RC4 stream cipher, image data is scrambled using the Zigzag method, and the key used in the transformation is encrypted using the ECC technique. The proposed algorithm was tested using several standard metrics, and the results show that it outperforms existing encryption techniques in terms of security.
Title: Triple Encryption of Images based on RC4, Zigzag, and Elliptic Curve Algorithms for Enhanced Security
Description:
The security of digital images is of paramount importance in today's digital world.
Encryption is a technique used to secure digital images from unauthorized access.
The encryption technique transforms the original image into a scrambled form, which is unreadable to anyone without the proper decryption key.
Several encryption techniques have been proposed to secure digital images, including DES, AES, RSA, and ECC.
These methods, however, are susceptible to side-channel and brute-force attacks.
Hence, new encryption methods that offer more security are required.
The new multi-encryption algorithm for secure digital image encryption is presented in this research.
The suggested approach combines the RC4, Zigzag transformation, and Elliptic Curve Cryptography (ECC) algorithms to increase the security of picture encryption.
Data is encrypted using the RC4 stream cipher, image data is scrambled using the Zigzag method, and the key used in the transformation is encrypted using the ECC technique.
The proposed algorithm was tested using several standard metrics, and the results show that it outperforms existing encryption techniques in terms of security.
Related Results
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Automatic Selective Encryption of DICOM Images
Automatic Selective Encryption of DICOM Images
Securing DICOM images is essential to protect the privacy of patients, especially in the era of telemedicine and eHealth/mHealth. This increases the demand for rapid security. Neve...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Efficient Elliptic Curve Arithmetic for Lightweight Cryptographic Schemes for IoT Applications
Efficient Elliptic Curve Arithmetic for Lightweight Cryptographic Schemes for IoT Applications
The Internet of Things’ (IoT) market is expected to grow exponentially at the global level in the coming years, due to the proliferation of more reliable and faster networks result...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
A Layered Approach For Improved Cloud Storage Security And Protection Of Access Policy
A Layered Approach For Improved Cloud Storage Security And Protection Of Access Policy
Information technology provides a service called cloud computing, which offers many beneficial functions. But there are a lot of problems and drawbacks with cloud computing, the mo...
Control the Sensitivity of the Encryption Key to Ensure the Security of Big Data
Control the Sensitivity of the Encryption Key to Ensure the Security of Big Data
With the increasing technological development that has led to the complexity of big data systems, the importance lies in the challenge that ensures the security of sensitive inform...

