{"title":"Encryption with Automatic key Generation and Compression","authors":"M. G.C, V. Perumal","doi":"10.1109/ICICICT54557.2022.9917718","DOIUrl":null,"url":null,"abstract":"Many applications rely on the transmission of digital images which contains confidential information. It is necessary to secure the confidential images from the eve’s droppers. Along with the attempts of providing confidentiality, it is also essential to reduce the amount of time taken for the encryption with the help of data compression techniques. To enhance the security, key should be changed frequently to repel the brute force attacks. The aim of this research is twofold. First, to propose a simple automatic key generation technique by using the modified logistic chaotic map and Chinese remainder theorem (CRT). Second, to improve the speed of encryption by using Integer wavelet-based compression. The qualitative analysis of the key generation is evaluated with the help of average hamming distance. The encryption quality is assessed with the help of statistical and sensitivity tests. Performance of the system is reported in terms of throughput.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICICT54557.2022.9917718","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Many applications rely on the transmission of digital images which contains confidential information. It is necessary to secure the confidential images from the eve’s droppers. Along with the attempts of providing confidentiality, it is also essential to reduce the amount of time taken for the encryption with the help of data compression techniques. To enhance the security, key should be changed frequently to repel the brute force attacks. The aim of this research is twofold. First, to propose a simple automatic key generation technique by using the modified logistic chaotic map and Chinese remainder theorem (CRT). Second, to improve the speed of encryption by using Integer wavelet-based compression. The qualitative analysis of the key generation is evaluated with the help of average hamming distance. The encryption quality is assessed with the help of statistical and sensitivity tests. Performance of the system is reported in terms of throughput.