Cryptographic Analysis of Blur-Based Encryption an In-depth Examination of Resilience Against Various Attack Vectors
Keywords:
Blur-based image encryption, security evaluation, brute-force attacks, statistical attacks, Gaussian Blur, Henon map, Proposed Enhancements, identification of WeaknessesAbstract
The study tests the encryption method's robustness against frequent image-processing operations and its resistance to well-known cryptographic attacks. This article assesses the blur-based photo encryption approach and shows how it resists image processing operations and cryptographic attacks. We also discuss the system's advantages, emphasizing its efficiency and usability. It illustrates the method's suitability for secure multimedia transmission and storage applications, points out shortcomings, and suggests future enhancements. The Arnold Transform, logistic Map, Henon Map, Modified Arnold Transform, and Baker Map are only a few of the methods used in the study. It also highlights the performance of the Gaussian blur algorithm in comparison to other approaches, emphasizing how quickly it encrypts data in just 0.0006 seconds. It also highlights how much faster the Gaussian blur algorithm is than other algorithms.
Downloads
Published
How to Cite
Issue
Section
License
This is an open Access Article published by Research Center of Computing & Biomedical Informatics (RCBI), Lahore, Pakistan under CCBY 4.0 International License