Machine Learning Models for Analyzing Different Cryptosystems' Security Levels

Authors

  • S. Sandhya  Department of Computer Science and Engineering, Sree Rama Engineering College, Tirupati, India
  • S. Swetha  Associate Professor, Department of Computer Science and Engineering, Sree Rama Engineering College, Tirupati, India

Keywords:

Support vector machine (SVM), security analysis, image encryption, cryptosystem.

Abstract

Recent developments in multimedia technology have made the security of digital data a vital concern. To address the shortcomings of the current security mechanisms, researchers frequently concentrate their efforts on altering the existing protocols. However, during the past few decades, a number of suggested encryption algorithms have been shown to be unsafe, posing a major security risk to sensitive data. The optimal encryption technique must be used in order to protect against these attacks, but the type of data being secured will determine which algorithm is ideal in a particular circumstance. However, comparing several cryptosystems one at a time to find the best one might take a lot of processing time. We provide a support vector machine-based method for quickly and accurately choosing the appropriate encryption algorithms for photo encryption techniques (SVM). As part of this endeavour, we also generate a dataset using widely used security standards for encryption, including entropy, contrast, homogeneity, peak signal-to-noise ratio, mean square error, energy, and correlation. These factors are utilized as traits that were extracted from different cypher images. Dataset labels are divided into three categories based on their security level: strong, acceptable, and weak. Our recommended model's performance was examined for accuracy, and the findings demonstrate the effectiveness of our SVM-supported system.

References

  1. I. Hussain, A. Anees, A. H. Alkhaldi, M. Aslam, N. Siddiqui, and R. Ahmed, ‘‘Image encryption based on Chebyshev chaotic map and S8 S-boxes.
  2. A. Anees, I. Hussain, A. Algarni, and M. Aslam, ‘‘A robust watermarking scheme for online multimedia copyright protection using new chaotic map,’’. 
  3. A. Shafique and J. Ahmed, ‘‘Dynamic substitution based encryption algorithm for highly correlated data, “.
  4. F. Ahmed, A. Anees, V. U. Abbas, and M. Y. Siyal, ‘‘A noisy channel tolerant image encryption scheme,’’.
  5. M. A. B. Farah, R. Guesmi, A. Kachouri, and M. Samet, ‘‘A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation,”.
  6. C. E. Shannon, ‘‘Communication in the presence of noise,”.
  7. S. Heron, ‘‘Advanced encryption standard (AES),’’.
  8. H. Liu, A. Kadir, and X. Sun, ‘‘Chaos-based fast colour image encryption scheme with true random number keys from environmental noise,’’.
  9. Y.-L. Lee and W.-H. Tsai, ‘‘A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations’’.
  10.  A. Anees, A. M. Siddiqui, and F. Ahmed, ‘‘Chaotic substitution for highly auto correlated data in encryption algorithm,’’.
  11. L. Liu, Y. Lei, and D. Wang, ‘‘A fast chaotic image encryption scheme with simultaneous permutation-diffusion operation’’.
  12. M. Khalili and D. Asatryan, ‘‘Colour spaces effects on improved discrete wavelet transform-based digital image watermarking using Arnold transform map,”.
  13. L. Zhang, J. Wu, and N. Zhou, ‘‘Image encryption with discrete fractional cosine transform and chaos.

Downloads

Published

2022-10-30

Issue

Section

Research Articles

How to Cite

[1]
S. Sandhya, S. Swetha, " Machine Learning Models for Analyzing Different Cryptosystems' Security Levels" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 5, pp.136-143, September-October-2022.