CFP last date
22 July 2024
Reseach Article

A Secure Selective Image and Voice Encryption (SSIVE): Privacy Enhancing Strategy

by Parabjot Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 1
Year of Publication: 2024
Authors: Parabjot Kaur
10.5120/ijca2024923340

Parabjot Kaur . A Secure Selective Image and Voice Encryption (SSIVE): Privacy Enhancing Strategy. International Journal of Computer Applications. 186, 1 ( Jan 2024), 31-33. DOI=10.5120/ijca2024923340

@article{ 10.5120/ijca2024923340,
author = { Parabjot Kaur },
title = { A Secure Selective Image and Voice Encryption (SSIVE): Privacy Enhancing Strategy },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2024 },
volume = { 186 },
number = { 1 },
month = { Jan },
year = { 2024 },
issn = { 0975-8887 },
pages = { 31-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number1/33039-2024923340/ },
doi = { 10.5120/ijca2024923340 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:29:27.220992+05:30
%A Parabjot Kaur
%T A Secure Selective Image and Voice Encryption (SSIVE): Privacy Enhancing Strategy
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 1
%P 31-33
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Over the last few years there has been explosive growth in the era of network security. As seen most of our daily life tasks are handled over the electronic wire(e-wire)/digital wire now a days & different types of users are exists on the same channel in terms of hackers, crackers, authentic users, any professional or worker, student who may be a learner, geek (who is expert in net surfing), social butterfly(who most of the time preferring the social media for daily life communication ) & entertainment buff ( who are intermediate internet users). Different types of users are performing different types of jobs as an example is a hacker is always try to gain unauthorized access for stealing information in order to commit crimes. So, to provide security on the network becomes a global issue in the cyber world/digital world. This research paper discusses about the different types of image and voice encryption algorithms used in different disciplines & also proposes a new algorithm named “SSIVE” which is termed as “Secure Selective Image and Voice Encryption” whose main/fair objective is to provide a high level of security within a short span of time that automatically increase newly proposed algorithm performance. The primary advantage of selective image and voice encryption is to reduce the amount of data to encrypt (use only subset for encryption) for providing a sufficient level of security. The Practical use of this new designed methodology is medical science applications, military forces where image protection is required at high rate. The complete working of this new designed methodology depends on three step encryption algorithms used for cyber security (3SEMCS). Hence, the selection of parameters which are considered on the time of encryption is consequential.

References
  1. Ayoup Ahmed & Hussein Amr, Efficient Selective Image Encryption, Springer December 2016.
  2. Zia Unsub & McCartney Mark , Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains, SpringerLink, April 2022.
  3. Massoudi A & Lefebvre.F,Overview on selective encryption of image and video: Challenges and perspectives, EURASIP Journal on Information Security, Springer Open, December 2008.
  4. Panzade Prajwal & TakabiDaniel, Sok: Privacy preserving machine learning using functional encryption: opportunities and challenges,arXiv:2204.05136v2[cs.CR], September 2022.
  5. Alluhaidan Saleh Ala, Secure medical data model using integrated transformed paillier and KLEIN algorithm encryption technique with elephant herd optimization for healthcare applications, National Library of Medicine, PMC PubMed Central, October 2022.
  6. Alothman Basil Raya, A performance based comparative encryption and decryption technique for image and video for mobile computing, IGI Global, Publisher of Timely Knowledge,2015.
  7. Miao Suoxia and Liu Lingfeng, A new Image Encryption Algorithm based on Logistic Chaotic Map with varying parameter, Springer plus, 2016.
  8. Chuchra .R and Seth R.K. Modeling Implementation of TSEA - Three Step Encryption Algorithm for Enhancing Password Security. International Journal of Computer Applications, US, September 2015.
  9. Singh Manraj and Kumar Amit. Proposing 3SEMCS- Three Step Encryption Method for Cyber Security in Modern Cryptography. International Journal of Computer Applications, US, April 2015.
  10. Kumar Pramod and pateriya Pushpendra. RC4 Enrichment Algorithm Approach for Selective Image Encryption. International Journal of Computer Science and Communication Networks May 2012.
  11. Verma O P, Aggarwal Ritu and Tyagi Shobha, Performance Analysis Of Data Encryption Algorithms, IEEE, 2011.
  12. Gandhi A. Rashmi and Gosai M.Atul , A Study on Current Scenario of Audio Encryption, International journal of Computer Applications, April 2015.
  13. Zhao Tieyu and Ran Qiwen, Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography, ELSEVIER, September 2015.
  14. Kingston A., Colosimo S., Campisi P., Autrusseau F.,” Lossless Image Compression & Selective encryption using a discrete random transform, IEEE, 2007.
  15. Wu C.-P & Kuo -C. J., Design of integrated multimedia compression and encryption systems, IEEE Trans. Multimedia, 2005.
  16. Vyavahare B. Raviraj and Bajaj. J Amit, Study of secure data transmission using Audio File”, International Journal of advanced research in computer and communication engineering, February 2015.
  17. Stinson, D.R.: Cryptography: Theory and Practice. CRC Press, Boca Raton (2006).
Index Terms

Computer Science
Information Sciences

Keywords

Encryption algorithms selective Image encryption Selective Voice Encryption Time Speed Security memory consumption computed encryption time execution time.