Secure gray image sharing framework with adaptive key generation using image digest
Abstract In the constantly changing digital age where instant information sharing is shared globally, the content’s safe delivery and privacy management have become necessary. Mainly, information in multimedia data becomes massive in networks, and sharing such data becomes vital and vulnerable. To m...
Saved in:
| Main Authors: | , , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Nature Portfolio
2025-03-01
|
| Series: | Scientific Reports |
| Subjects: | |
| Online Access: | https://doi.org/10.1038/s41598-025-92752-9 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850040248098095104 |
|---|---|
| author | C. Nithya C. Lakshmi K. Thenmozhi M. V. Harshavardhan R. Kumaran Padmapriya Velupillai Meikandan Hemalatha Mahalingam Rengarajan Amirtharajan |
| author_facet | C. Nithya C. Lakshmi K. Thenmozhi M. V. Harshavardhan R. Kumaran Padmapriya Velupillai Meikandan Hemalatha Mahalingam Rengarajan Amirtharajan |
| author_sort | C. Nithya |
| collection | DOAJ |
| description | Abstract In the constantly changing digital age where instant information sharing is shared globally, the content’s safe delivery and privacy management have become necessary. Mainly, information in multimedia data becomes massive in networks, and sharing such data becomes vital and vulnerable. To mitigate the vulnerability in information sharing over public networks, it is crucial to develop privacy-preserving algorithms and system security schemes that ensure the safety, ownership and integrity of the information that travels through the network. The confusion and diffusion strategies are significant in enhancing the robustness of the encryption algorithms. This paper deals with ensuring the image’s Confidentiality–Integrity–Authenticity (CIA triad) aspects using image encryption, integrity and authentication strategies. The proposed algorithm generates a one-way hash value based on pixel intensity, which acts as a digital fingerprint for the image to validate integrity failures. The hash value of the image is used as a diffusion key in the proposed image-specific encryption algorithm. Lorentz attractor generates a random index for confusion in the proposed encryption algorithm. The CIA triad system involves the deployment of a one-way “Authentication token” (Authtoken) generator that produces an image-specific token. The suggested system was examined using several CIA-related metrics, yielding an average entropy of 7.97871 and a correlation of 0.00337. Other metrics further demonstrate the applicability of the proposed framework. Hence, the suggested security solution offers an absolute CIA triad while they are being transmitted. |
| format | Article |
| id | doaj-art-643fba27236844fd9cbec89b0ab9a17a |
| institution | DOAJ |
| issn | 2045-2322 |
| language | English |
| publishDate | 2025-03-01 |
| publisher | Nature Portfolio |
| record_format | Article |
| series | Scientific Reports |
| spelling | doaj-art-643fba27236844fd9cbec89b0ab9a17a2025-08-20T02:56:08ZengNature PortfolioScientific Reports2045-23222025-03-0115111710.1038/s41598-025-92752-9Secure gray image sharing framework with adaptive key generation using image digestC. Nithya0C. Lakshmi1K. Thenmozhi2M. V. Harshavardhan3R. Kumaran4Padmapriya Velupillai Meikandan5Hemalatha Mahalingam6Rengarajan Amirtharajan7School of Electrical & Electronics Engineering, SASTRA Deemed UniversitySchool of Electrical & Electronics Engineering, SASTRA Deemed UniversitySchool of Electrical & Electronics Engineering, SASTRA Deemed UniversitySchool of Electrical & Electronics Engineering, SASTRA Deemed UniversitySchool of Electrical & Electronics Engineering, SASTRA Deemed UniversityDepartment of Computer Sciences, Marquette UniversityFaculty of Engineering, King Abdulaziz UniversitySchool of Electrical & Electronics Engineering, SASTRA Deemed UniversityAbstract In the constantly changing digital age where instant information sharing is shared globally, the content’s safe delivery and privacy management have become necessary. Mainly, information in multimedia data becomes massive in networks, and sharing such data becomes vital and vulnerable. To mitigate the vulnerability in information sharing over public networks, it is crucial to develop privacy-preserving algorithms and system security schemes that ensure the safety, ownership and integrity of the information that travels through the network. The confusion and diffusion strategies are significant in enhancing the robustness of the encryption algorithms. This paper deals with ensuring the image’s Confidentiality–Integrity–Authenticity (CIA triad) aspects using image encryption, integrity and authentication strategies. The proposed algorithm generates a one-way hash value based on pixel intensity, which acts as a digital fingerprint for the image to validate integrity failures. The hash value of the image is used as a diffusion key in the proposed image-specific encryption algorithm. Lorentz attractor generates a random index for confusion in the proposed encryption algorithm. The CIA triad system involves the deployment of a one-way “Authentication token” (Authtoken) generator that produces an image-specific token. The suggested system was examined using several CIA-related metrics, yielding an average entropy of 7.97871 and a correlation of 0.00337. Other metrics further demonstrate the applicability of the proposed framework. Hence, the suggested security solution offers an absolute CIA triad while they are being transmitted.https://doi.org/10.1038/s41598-025-92752-9Information securityImage encryptionLorenz attractorHash algorithmOne-way authenticationCIA triad |
| spellingShingle | C. Nithya C. Lakshmi K. Thenmozhi M. V. Harshavardhan R. Kumaran Padmapriya Velupillai Meikandan Hemalatha Mahalingam Rengarajan Amirtharajan Secure gray image sharing framework with adaptive key generation using image digest Scientific Reports Information security Image encryption Lorenz attractor Hash algorithm One-way authentication CIA triad |
| title | Secure gray image sharing framework with adaptive key generation using image digest |
| title_full | Secure gray image sharing framework with adaptive key generation using image digest |
| title_fullStr | Secure gray image sharing framework with adaptive key generation using image digest |
| title_full_unstemmed | Secure gray image sharing framework with adaptive key generation using image digest |
| title_short | Secure gray image sharing framework with adaptive key generation using image digest |
| title_sort | secure gray image sharing framework with adaptive key generation using image digest |
| topic | Information security Image encryption Lorenz attractor Hash algorithm One-way authentication CIA triad |
| url | https://doi.org/10.1038/s41598-025-92752-9 |
| work_keys_str_mv | AT cnithya securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest AT clakshmi securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest AT kthenmozhi securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest AT mvharshavardhan securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest AT rkumaran securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest AT padmapriyavelupillaimeikandan securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest AT hemalathamahalingam securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest AT rengarajanamirtharajan securegrayimagesharingframeworkwithadaptivekeygenerationusingimagedigest |