Finite Field-Based Three-Tier Cryptography Algorithm to Secure the Images.

Received: 05 Dec 2024, Revised: 07 Dec 2024, Accepted: 26 Jan 2025, Available online: 10 Feb 2025, Version of Record: 10 Feb 2025

Lavanya, M.; Sundar, K. Joseph Abraham; Saravanan, S.

Abstract


Securing the information is an important component in the computer network domain. Image information security is a vital part of the information security. The main process of image cryptography is traversing the image cryptosystem with high processing power, and efficiency. It is in terms of satisfying the cryptography requirements like confidentiality, integrity, and authenticity. A finite field-based image cryptography algorithm called TIEA (Three-tier Image Encryption Algorithm) is proposed in this paper. This algorithm deliberated Shannon's principles of cryptography like confusion and diffusion techniques of the images based on the finite field values. This paper also designed the key stream generation pattern based on the crypto key length. Two subkeys are generated for the purpose of crypto key and the key generation process is used to enhance the permutation of the key. Various benchmark images were tested with this proposed algorithm and also with other existing algorithms. The performance result shows that the proposed algorithm TIEA could be a better candidate algorithm for image security in the network domain.
Subjects
INFORMATION technology securityFINITE fieldsCOMPUTER networksIMAGE encryptionCOMPUTER network security



Description



   

Indexed in scopus

https://openurl.ebsco.com/EPDB%3Agcd%3A13%3A34620525/detailv2?sid=ebsco%3Aplink%3Aresult-item&id=ebsco%3Adoi%3A10.14429%2Fdsj.20107&bquery=Defence%20Science%20Journal&page=1&link_origin=www.google.com
      

Article metrics

10.31763/DSJ.v5i1.1674 Abstract views : | PDF views :

   

Cite

   

Full Text

Download

Conflict of interest


“Authors state no conflict of interest”


Funding Information


This research received no external funding or grants


Peer review:


Peer review under responsibility of Defence Science Journal


Ethics approval:


Not applicable.


Consent for publication:


Not applicable.


Acknowledgements:


None.