skip to main content
10.1145/3443467.3443796acmotherconferencesArticle/Chapter ViewAbstractPublication PageseitceConference Proceedingsconference-collections
research-article

A Novel Color Image Encryption Mechanism Based on Visual Cryptography, SHA-512 and One-time Password

Published: 01 February 2021 Publication History

Abstract

With the rapid development of information sciences and communication networks, the security of digital images has been concerned seriously. However, many of the current image encryption mechanisms trend to adopt complex algorithms and functions, resulting in high calculation power consumption, which is not suitable for mobile devices. Aiming to this issue, a color image encryption mechanism using visual cryptography, SHA-512 and one-time password is proposed. Based on visual cryptography, the encryption mechanism works through split the plain image into several shares and encrypted for transmission. For image decryption, only XOR operations are required and the computation complexity is greatly reduced. Besides, the SHA-512 and one-time password are utilized to protect the security of cipher keys and reduce the possibility of correct cipher images be intercepted. The experimental results demonstrate that the proposed mechanism has high security with low computational time consumption.

References

[1]
Mondal, Arindom & Alam, Kazi & Ali, G. G. Md. Nawaz & Han, Peter & Chong, Joo & Morimoto, Yasuhiko, 2019. A Multi-Stage Encryption Technique to Enhance the Secrecy of Image. KSII Transactions on Internet and Information Systems. 13(5): 2698--2717.
[2]
A. U. Rehman, H. Wang, M. M. Ali Shahid, S. Iqbal, Z. Abbas and A. Firdous, 2019. A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512. IEEE Access. vol. 7, pp. 162786--162802.
[3]
Xuejing, Kang & Zihui, Guo, 2019. A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system. Signal Processing: Image Communication. vol. 80, p. 115670, 2020.
[4]
S. A. Thomas and S. Gharge. 2017. Review on Various Visual Cryptography Schemes. In Proceedings of 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC). Mysore, 2017, pp. 1164--1167.
[5]
M. Karolin and T. Meyyappan. 2019. Secret Multiple Share Creation with Color Images using Visual Cryptography. In Proceedings of 2019 International Conference on Communication and Signal Processing (ICCSP). Chennai, India, 2019, pp. 0058--0062.
[6]
T. Patel and R. Srivastava. 2016. A new technique for color share generation using visual cryptography. In Proceedings of 2016 International Conference on Inventive Computation Technologies (ICICT). Coimbatore, 2016, pp. 1--4.
[7]
S. Bhatia, S. K. Khatri and A. V. Singh. 2018. Digital Image Security Using Hybrid Visual Cryptography. In Proceedings of 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). Noida, India, 2018, pp. 570--576.
[8]
M. Naor and A. Shamir. 1995. Visual cryptography. In Proceedings of Advances in Cryptology-EUROCRYPT'94. Berlin, Heidelberg, pp. 1--12.
[9]
M. McLoone and J. V. McCanny. 2002. Efficient single-chip implementation of SHA-384 and SHA-512. In Proceedings of 2002 IEEE International Conference on Field-Programmable Technology, (FPT). Hong Kong, China, 2002, pp. 311--314.
[10]
S. Lee and K. Shin. 2018. An efficient implementation of SHA processor including three hash algorithms (SHA-512, SHA-512/224, SHA-512/256). In Proceedings of 2018 International Conference on Electronics, Information, and Communication (ICEIC). Honolulu, HI, 2018, pp. 1--4.
[11]
A. Al Khas and I. Cicek. 2019. SHA-512 based Wireless Authentication Scheme for Smart Battery Management Systems. In Proceedings of 2019 8th International Conference on Renewable Energy Research and Applications (ICRERA). Brasov, Romania, pp. 968--972.
[12]
E. Sediyono, K. I. Santoso and Suhartono. 2013. Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS. In Proceedings of 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI). Mysore, pp. 1604--1608.

Index Terms

  1. A Novel Color Image Encryption Mechanism Based on Visual Cryptography, SHA-512 and One-time Password

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    EITCE '20: Proceedings of the 2020 4th International Conference on Electronic Information Technology and Computer Engineering
    November 2020
    1202 pages
    ISBN:9781450387811
    DOI:10.1145/3443467
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 February 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Color image encryption
    2. One-time password
    3. SHA-512
    4. Security analysis
    5. Visual cryptography

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    EITCE 2020

    Acceptance Rates

    EITCE '20 Paper Acceptance Rate 214 of 441 submissions, 49%;
    Overall Acceptance Rate 508 of 972 submissions, 52%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 44
      Total Downloads
    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media