International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 186 - Number 1 |
Year of Publication: 2024 |
Authors: Parabjot Kaur |
10.5120/ijca2024923340 |
Parabjot Kaur . A Secure Selective Image and Voice Encryption (SSIVE): Privacy Enhancing Strategy. International Journal of Computer Applications. 186, 1 ( Jan 2024), 31-33. DOI=10.5120/ijca2024923340
Over the last few years there has been explosive growth in the era of network security. As seen most of our daily life tasks are handled over the electronic wire(e-wire)/digital wire now a days & different types of users are exists on the same channel in terms of hackers, crackers, authentic users, any professional or worker, student who may be a learner, geek (who is expert in net surfing), social butterfly(who most of the time preferring the social media for daily life communication ) & entertainment buff ( who are intermediate internet users). Different types of users are performing different types of jobs as an example is a hacker is always try to gain unauthorized access for stealing information in order to commit crimes. So, to provide security on the network becomes a global issue in the cyber world/digital world. This research paper discusses about the different types of image and voice encryption algorithms used in different disciplines & also proposes a new algorithm named “SSIVE” which is termed as “Secure Selective Image and Voice Encryption” whose main/fair objective is to provide a high level of security within a short span of time that automatically increase newly proposed algorithm performance. The primary advantage of selective image and voice encryption is to reduce the amount of data to encrypt (use only subset for encryption) for providing a sufficient level of security. The Practical use of this new designed methodology is medical science applications, military forces where image protection is required at high rate. The complete working of this new designed methodology depends on three step encryption algorithms used for cyber security (3SEMCS). Hence, the selection of parameters which are considered on the time of encryption is consequential.