Skip to main content
Log in

Asymmetric image authentication algorithm using double random modulus decomposition and CGI

  • Published:
Computational and Applied Mathematics Aims and scope Submit manuscript

Abstract

In this paper, we have proposed asymmetric image encryption cum authentication cryptosystem based on double random modulus decomposition using computational ghost imaging in the Fourier domain. The literature demonstrates that image encryption algorithms relying on double random modulus decomposition are susceptible to iterative cryptographic attacks. Computational ghost imaging is used to enhance the security of double random modulus decomposition-based cryptosystem and resistant to iterative cryptographic attack. The encrypted image is quite random and appear noisy and can be used for encryption as well as authentication purpose. The proposed cryptosystem is validated for binary, grayscale and medical images. Various statistical metrics, such as mean squared error, information entropy, and correlation coefficient, are applied to analyse the strength of the cryptosystem. Statistical attacks in terms of correlation distribution plots, 3-D plots are performed on the cryptosystem. The results indicate that the cryptosystem is robust against statistical attacks. All decryption keys are essential for faithful recovery of the original image as well as in the authentication cryptosystem. However, in the authentication cryptosystem, we have shown that if more than 6% of any individual key data are lost, cryptosystem fail to recognise the image. Therefore, the proposed encryption cum authentication cryptosystem is safe and secure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6.
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raman Yadav.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest concerning the publication of this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yadav, R., Singh, P. Asymmetric image authentication algorithm using double random modulus decomposition and CGI. Comp. Appl. Math. 42, 305 (2023). https://doi.org/10.1007/s40314-023-02443-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s40314-023-02443-2

Keywords

Mathematics Subject Classification

Navigation