FuzzyRSA-ChaosCrypt: Secure Text-to-Image Encryption for Communication
Keywords:Cryptography, chaotic map, fuzzy triangular membership function, Rivest-Shamir-Adleman (RSA), image encryption
Digital image encryption is crucial for user privacy while it is being shared over the internet. Methods like steganography and encryption-decryption play a vital role in this objective. Researchers and scholars are paying attention to these methods to keep data safe from hackers. The implementation of of these methods and tools ensures reliability of such algorithms. In this research work, a novel methodology FuzzyRSA-ChaosCrypt is developed by combining various techniques and components for encryption methods to protect communication and secure sensitive digital image data over unsecure computer network. In this method firstly, the most popular asymmetric cryptographic algorithm RSA (Rivest-Shamir-Adleman) and Optimal Asymmetric Encryption Padding (OAEP) for RSA public key encryption are employed. Secondly, it also includes fuzzylogic-based encryption functions and chaotic maps, which increase the encryption complexity and provide flexibility in cryptographic applications. Thirdly, during the encryption process, a specified degree of randomness is introduced by utilization of fuzzy triangular membership function. Fourthly, encryption key comprises the settings of the fuzzy function and the starting values of the chaotic maps. Using this key, the image is encrypted, resulting in a visually encrypted representation. Additionally, asymmetric RSA encryption is applied to securely insert a user-supplied message into the encrypted image. After encrypting the message using a strong RSA key pair, its binary representation is embedded into the least significant bits (LSB) of the encrypted image. This method is resistant to various attacks i.e., Brute-Force attacks, statistical attacks, known plain text attacks, and chosen plain text attacks. Even though provided method is robust and provides high encryption but it is limited to real time applications such as online video streaming.
How to Cite
This is an open Access Article published by Research Center of Computing & Biomedical Informatics (RCBI), Lahore, Pakistan under CCBY 4.0 International License