Treffer: Multilayered digital image encryption approach to resist cryptographic attacks for cybersecurity.

Title:
Multilayered digital image encryption approach to resist cryptographic attacks for cybersecurity.
Source:
PeerJ Computer Science; Oct2025, p1-27, 27p
Database:
Complementary Index

Weitere Informationen

In today's digital age, protecting sensitive image data is more important than ever, especially with the rise of computing advancements, which threaten traditional encryption methods. This article presents a novel image encryption model designed to enhance security against both conventional and future cyber threats. Our approach combines multiple encryption techniques, including Advanced Encryption Standard (AES), Triple DES (DES3), and Elliptic Curve Cryptography (ECC), along with additional security measures such as pixel shuffling, left circular shifting, and exclusive NOR (XNOR) operations. To ensure secure key exchange, we incorporate Elliptic Curve Diffie-Hellman (ECDH) and a hash-based key derivation function (HKDF) using a Hash-based Message Authentication Code (HMAC). By encapsulating the encrypted image and keys within a secure archive, this method provides a strong and durable solution to safeguard digital images in the evolving landscape of cybersecurity. The proposed cryptosystem achieves the high information entropy, the Number of Pixel Change Rate (NPCR), and the Unified Average Change Intensity (UACI) of 7.9995, 99.59% and 49.96%, respectively. In addition, the proposed model offers a large keyspace and demonstrates an avalanche effect of more than 50% which effectively resists various cryptographic attacks. The achieved results highlight the suitability of the proposed approach for robust encryption and resistance against various attacks. This combination of techniques helps to mitigate the shortcomings of standalone techniques and safeguard sensitive visual data in increasingly hostile digital environments. [ABSTRACT FROM AUTHOR]

Copyright of PeerJ Computer Science is the property of PeerJ Inc. and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)