FuzzyRSA-ChaosCrypt: Secure Text-to-Image Encryption for Communication

Authors

  • Laraib Liaquat Deparment of Computer Science, NFC-IET, Multan, Pakistan.
  • Naeem Aslam Deparment of Computer Science, NFC-IET, Multan, Pakistan.
  • Kamran Abid Deparment of Computer Science, NFC-IET, Multan, Pakistan.
  • Ahmad Naeem Deparment of Computer Science, NFC-IET, Multan, Pakistan.
  • Muhammad Fuzail

Keywords:

Cryptography, chaotic map, fuzzy triangular membership function, Rivest-Shamir-Adleman (RSA), image encryption

Abstract

Digital image encryption is crucial for user privacy while it is being shared over the internet. Methods like steganography and encryption-decryption play a vital role in this objective. Researchers and scholars are paying attention to these methods to keep data safe from hackers. The implementation of of these methods and tools ensures reliability of such algorithms. In this research work, a novel methodology FuzzyRSA-ChaosCrypt is developed by combining various techniques and components for encryption methods to protect communication and secure sensitive digital image data over unsecure computer network. In this method firstly, the most popular asymmetric cryptographic algorithm RSA (Rivest-Shamir-Adleman) and Optimal Asymmetric Encryption Padding (OAEP) for RSA public key encryption are employed. Secondly, it also includes fuzzylogic-based encryption functions and chaotic maps, which increase the encryption complexity and provide flexibility in cryptographic applications. Thirdly, during the encryption process, a specified degree of randomness is introduced by utilization of fuzzy triangular membership function. Fourthly, encryption key comprises the settings of the fuzzy function and the starting values of the chaotic maps. Using this key, the image is encrypted, resulting in a visually encrypted representation. Additionally, asymmetric RSA encryption is applied to securely insert a user-supplied message into the encrypted image. After encrypting the message using a strong RSA key pair, its binary representation is embedded into the least significant bits (LSB) of the encrypted image. This method is resistant to various attacks i.e., Brute-Force attacks, statistical attacks, known plain text attacks, and chosen plain text attacks. Even though provided method is robust and provides high encryption but it is limited to real time applications such as online video streaming.

Downloads

Published

2023-09-17

How to Cite

Laraib Liaquat, Naeem Aslam, Kamran Abid, Ahmad Naeem, & Muhammad Fuzail. (2023). FuzzyRSA-ChaosCrypt: Secure Text-to-Image Encryption for Communication. Journal of Computing & Biomedical Informatics, 5(02), 21–38. Retrieved from https://jcbi.org/index.php/Main/article/view/225