Cryptographic Analysis of Blur-Based Encryption an In-depth Examination of Resilience Against Various Attack Vectors

Authors

  • Hafiz Gulfam Ahmad Umar Ghazi University Department of CS & IT, Dera Ghazi Khan, 32200, Pakistan.
  • Shafiq Ur Rehman Department of Computing & Information Technology, Mir Chakar Khan Rind University of Technology, DG Khan, Pakistan.
  • Muhammad Aoun Ghazi University Department of CS & IT, Dera Ghazi Khan, 32200, Pakistan.
  • Muhammad Aftab Kaleem Ghazi University Department of CS & IT, Dera Ghazi Khan, 32200, Pakistan.
  • Muhammad Jamil Ghazi University Department of CS & IT, Dera Ghazi Khan, 32200, Pakistan.
  • Madiha Zahir Khan Ghazi University Department of CS & IT, Dera Ghazi Khan, 32200, Pakistan.
  • Muhammad Younis Department of Computer Science, Lasbela University of Agriculture, Water and Marine Sciences, Baluchistan 90150, Pakistan.

Keywords:

Blur-based image encryption, security evaluation, brute-force attacks, statistical attacks, Gaussian Blur, Henon map, Proposed Enhancements, identification of Weaknesses

Abstract

The study tests the encryption method's robustness against frequent image-processing operations and its resistance to well-known cryptographic attacks. This article assesses the blur-based photo encryption approach and shows how it resists image processing operations and cryptographic attacks. We also discuss the system's advantages, emphasizing its efficiency and usability. It illustrates the method's suitability for secure multimedia transmission and storage applications, points out shortcomings, and suggests future enhancements. The Arnold Transform, logistic Map, Henon Map, Modified Arnold Transform, and Baker Map are only a few of the methods used in the study. It also highlights the performance of the Gaussian blur algorithm in comparison to other approaches, emphasizing how quickly it encrypts data in just 0.0006 seconds. It also highlights how much faster the Gaussian blur algorithm is than other algorithms.

Downloads

Published

2023-09-17

How to Cite

Hafiz Gulfam Ahmad Umar, Shafiq Ur Rehman, Muhammad Aoun, Muhammad Aftab Kaleem, Muhammad Jamil, Madiha Zahir Khan, & Muhammad Younis. (2023). Cryptographic Analysis of Blur-Based Encryption an In-depth Examination of Resilience Against Various Attack Vectors. Journal of Computing & Biomedical Informatics, 5(02), 300–314. Retrieved from https://jcbi.org/index.php/Main/article/view/181