Enhancing image data security using the APFB model

被引:1
|
作者
Barik, Kousik [1 ]
Misra, Sanjay [2 ,3 ]
Sanz, Luis Fernandez [1 ]
Chockalingam, Sabarathinam [4 ]
机构
[1] Univ Alcala, Dept Comp Sci, Madrid, Spain
[2] Ostfold Univ Coll, Dept Comp Sci & Commun, Halden, Norway
[3] Inst Energy Technol, Dept Appl Data Sci, Halden, Norway
[4] Inst Energy Technol, Dept R & Secur, Halden, Norway
关键词
Cryptography; image security; cryptographic techniques; AES permuted feistel blowfish; ENCRYPTION; AES;
D O I
10.1080/09540091.2024.2379275
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ensuring the confidentiality of transmitting sensitive image data is paramount. Cryptography recreates a critical function in safeguarding information from potential risks and confirming the identity of authorised individuals, thereby addressing the growing demand for enhanced image security. This paper presents a novel AES-permuted Feistel Blowfish (APFB) model that aims to improve image data security cost-effectively and enhance data protection by incorporating AES and Blowfish algorithms. The proposed model's utility over existing approaches stems from its computational efficiency and speed. The proposed model's resilience and security against several attack modalities are validated through a comprehensive range of methods, including extensive experimentation, histogram analysis, PSNR, entropy, MSE, CC, computational time, and NIST statistical tests. The outcomes yielded a PSNR of 67.26, NPCR of 99.6354, and UACI of 33.412. Additionally, the applicability of the proposed model is validated by utilising a practical case analysis. The outcomes exhibit the relevance of the proposed model in real-world applications.
引用
收藏
页数:32
相关论文
共 50 条
  • [21] Enhancing Security Using Secure Authentication Model in Fog Computing Model
    Satheesh, Kavuri K. S. V. A.
    Sree, T. Krishna
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (02) : 909 - 933
  • [22] Enhancing Data Warehouses Security
    Alkhubouli, Muhanad A.
    Lala, Hany M.
    AlHabshy, AbdAllah A.
    ElDahshan, Kamal A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (03) : 574 - 580
  • [23] Enhancing the Security of Data Stored in the Cloud using customized Data Visualization Patterns
    Archana, M.
    Murtugudde, Gururaj
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (06) : 604 - 610
  • [24] Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy
    Eghmazi, Ali
    Ataei, Mohammadhossein
    Landry, Rene, Jr.
    Chevrette, Guy
    IOT, 2024, 5 (01): : 20 - 34
  • [25] A Survey on Cloud Data Security using Image Steganography
    Albalawi, Afrah
    Hamza, Nermin
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 645 - 649
  • [26] Enhancing security in electronic health records using an adaptive feature-centric polynomial data security model with blockchain integration
    Dhinakaran, D.
    Ramani, R.
    Raja, S. Edwin
    Selvaraj, D.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (02)
  • [27] Enhancing Data Retrieval Using Fuzzy Keywords and Data Security Using Feistal Encryption Algorithm
    Dhamija, Jalendu
    Rawat, Kaumudi
    Choudhury, Tanupriya
    Kumar, Praveen
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT 2018), 2018, : 257 - 262
  • [28] Enhancing Cryptocurrency Security Using AI Risk Management Model
    Elhoseny, Mohamed
    Darwiesh, Abdelaziz
    El-Baz, A. H.
    Rodrigues, Joel J. P. C.
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2024, 13 (01) : 48 - 53
  • [29] Bio-Inspired algorithms for secure image steganography: enhancing data security and quality in data transmission
    Rezaei, Samira
    Javadpour, Amir
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (35) : 82247 - 82280
  • [30] Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography
    Bin Hureib, Eshraq S.
    Gutub, Adnan A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (08): : 1 - 8