Secure gray image sharing framework with adaptive key generation using image digest

Abstract In the constantly changing digital age where instant information sharing is shared globally, the content’s safe delivery and privacy management have become necessary. Mainly, information in multimedia data becomes massive in networks, and sharing such data becomes vital and vulnerable. To m...

Full description

Saved in:
Bibliographic Details
Main Authors: C. Nithya, C. Lakshmi, K. Thenmozhi, M. V. Harshavardhan, R. Kumaran, Padmapriya Velupillai Meikandan, Hemalatha Mahalingam, Rengarajan Amirtharajan
Format: Article
Language:English
Published: Nature Portfolio 2025-03-01
Series:Scientific Reports
Subjects:
Online Access:https://doi.org/10.1038/s41598-025-92752-9
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850040248098095104
author C. Nithya
C. Lakshmi
K. Thenmozhi
M. V. Harshavardhan
R. Kumaran
Padmapriya Velupillai Meikandan
Hemalatha Mahalingam
Rengarajan Amirtharajan
author_facet C. Nithya
C. Lakshmi
K. Thenmozhi
M. V. Harshavardhan
R. Kumaran
Padmapriya Velupillai Meikandan
Hemalatha Mahalingam
Rengarajan Amirtharajan
author_sort C. Nithya
collection DOAJ
description Abstract In the constantly changing digital age where instant information sharing is shared globally, the content’s safe delivery and privacy management have become necessary. Mainly, information in multimedia data becomes massive in networks, and sharing such data becomes vital and vulnerable. To mitigate the vulnerability in information sharing over public networks, it is crucial to develop privacy-preserving algorithms and system security schemes that ensure the safety, ownership and integrity of the information that travels through the network. The confusion and diffusion strategies are significant in enhancing the robustness of the encryption algorithms. This paper deals with ensuring the image’s Confidentiality–Integrity–Authenticity (CIA triad) aspects using image encryption, integrity and authentication strategies. The proposed algorithm generates a one-way hash value based on pixel intensity, which acts as a digital fingerprint for the image to validate integrity failures. The hash value of the image is used as a diffusion key in the proposed image-specific encryption algorithm. Lorentz attractor generates a random index for confusion in the proposed encryption algorithm. The CIA triad system involves the deployment of a one-way “Authentication token” (Authtoken) generator that produces an image-specific token. The suggested system was examined using several CIA-related metrics, yielding an average entropy of 7.97871 and a correlation of 0.00337. Other metrics further demonstrate the applicability of the proposed framework. Hence, the suggested security solution offers an absolute CIA triad while they are being transmitted.
format Article
id doaj-art-643fba27236844fd9cbec89b0ab9a17a
institution DOAJ
issn 2045-2322
language English
publishDate 2025-03-01
publisher Nature Portfolio
record_format Article
series Scientific Reports
spelling doaj-art-643fba27236844fd9cbec89b0ab9a17a2025-08-20T02:56:08ZengNature PortfolioScientific Reports2045-23222025-03-0115111710.1038/s41598-025-92752-9Secure gray image sharing framework with adaptive key generation using image digestC. Nithya0C. Lakshmi1K. Thenmozhi2M. V. Harshavardhan3R. Kumaran4Padmapriya Velupillai Meikandan5Hemalatha Mahalingam6Rengarajan Amirtharajan7School of Electrical & Electronics Engineering, SASTRA Deemed UniversitySchool of Electrical & Electronics Engineering, SASTRA Deemed UniversitySchool of Electrical & Electronics Engineering, SASTRA Deemed UniversitySchool of Electrical & Electronics Engineering, SASTRA Deemed UniversitySchool of Electrical & Electronics Engineering, SASTRA Deemed UniversityDepartment of Computer Sciences, Marquette UniversityFaculty of Engineering, King Abdulaziz UniversitySchool of Electrical & Electronics Engineering, SASTRA Deemed UniversityAbstract In the constantly changing digital age where instant information sharing is shared globally, the content’s safe delivery and privacy management have become necessary. Mainly, information in multimedia data becomes massive in networks, and sharing such data becomes vital and vulnerable. To mitigate the vulnerability in information sharing over public networks, it is crucial to develop privacy-preserving algorithms and system security schemes that ensure the safety, ownership and integrity of the information that travels through the network. The confusion and diffusion strategies are significant in enhancing the robustness of the encryption algorithms. This paper deals with ensuring the image’s Confidentiality–Integrity–Authenticity (CIA triad) aspects using image encryption, integrity and authentication strategies. The proposed algorithm generates a one-way hash value based on pixel intensity, which acts as a digital fingerprint for the image to validate integrity failures. The hash value of the image is used as a diffusion key in the proposed image-specific encryption algorithm. Lorentz attractor generates a random index for confusion in the proposed encryption algorithm. The CIA triad system involves the deployment of a one-way “Authentication token” (Authtoken) generator that produces an image-specific token. The suggested system was examined using several CIA-related metrics, yielding an average entropy of 7.97871 and a correlation of 0.00337. Other metrics further demonstrate the applicability of the proposed framework. Hence, the suggested security solution offers an absolute CIA triad while they are being transmitted.https://doi.org/10.1038/s41598-025-92752-9Information securityImage encryptionLorenz attractorHash algorithmOne-way authenticationCIA triad
spellingShingle C. Nithya
C. Lakshmi
K. Thenmozhi
M. V. Harshavardhan
R. Kumaran
Padmapriya Velupillai Meikandan
Hemalatha Mahalingam
Rengarajan Amirtharajan
Secure gray image sharing framework with adaptive key generation using image digest
Scientific Reports
Information security
Image encryption
Lorenz attractor
Hash algorithm
One-way authentication
CIA triad
title Secure gray image sharing framework with adaptive key generation using image digest
title_full Secure gray image sharing framework with adaptive key generation using image digest
title_fullStr Secure gray image sharing framework with adaptive key generation using image digest
title_full_unstemmed Secure gray image sharing framework with adaptive key generation using image digest
title_short Secure gray image sharing framework with adaptive key generation using image digest
title_sort secure gray image sharing framework with adaptive key generation using image digest
topic Information security
Image encryption
Lorenz attractor
Hash algorithm
One-way authentication
CIA triad
url https://doi.org/10.1038/s41598-025-92752-9
work_keys_str_mv AT cnithya securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest
AT clakshmi securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest
AT kthenmozhi securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest
AT mvharshavardhan securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest
AT rkumaran securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest
AT padmapriyavelupillaimeikandan securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest
AT hemalathamahalingam securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest
AT rengarajanamirtharajan securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest