Machine Learning Models for Analyzing Different Cryptosystems' Security Levels
Keywords:
Support vector machine (SVM), security analysis, image encryption, cryptosystem.Abstract
Recent developments in multimedia technology have made the security of digital data a vital concern. To address the shortcomings of the current security mechanisms, researchers frequently concentrate their efforts on altering the existing protocols. However, during the past few decades, a number of suggested encryption algorithms have been shown to be unsafe, posing a major security risk to sensitive data. The optimal encryption technique must be used in order to protect against these attacks, but the type of data being secured will determine which algorithm is ideal in a particular circumstance. However, comparing several cryptosystems one at a time to find the best one might take a lot of processing time. We provide a support vector machine-based method for quickly and accurately choosing the appropriate encryption algorithms for photo encryption techniques (SVM). As part of this endeavour, we also generate a dataset using widely used security standards for encryption, including entropy, contrast, homogeneity, peak signal-to-noise ratio, mean square error, energy, and correlation. These factors are utilized as traits that were extracted from different cypher images. Dataset labels are divided into three categories based on their security level: strong, acceptable, and weak. Our recommended model's performance was examined for accuracy, and the findings demonstrate the effectiveness of our SVM-supported system.
References
- I. Hussain, A. Anees, A. H. Alkhaldi, M. Aslam, N. Siddiqui, and R. Ahmed, ‘‘Image encryption based on Chebyshev chaotic map and S8 S-boxes.
- A. Anees, I. Hussain, A. Algarni, and M. Aslam, ‘‘A robust watermarking scheme for online multimedia copyright protection using new chaotic map,’’.
- A. Shafique and J. Ahmed, ‘‘Dynamic substitution based encryption algorithm for highly correlated data, “.
- F. Ahmed, A. Anees, V. U. Abbas, and M. Y. Siyal, ‘‘A noisy channel tolerant image encryption scheme,’’.
- M. A. B. Farah, R. Guesmi, A. Kachouri, and M. Samet, ‘‘A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation,”.
- C. E. Shannon, ‘‘Communication in the presence of noise,”.
- S. Heron, ‘‘Advanced encryption standard (AES),’’.
- H. Liu, A. Kadir, and X. Sun, ‘‘Chaos-based fast colour image encryption scheme with true random number keys from environmental noise,’’.
- Y.-L. Lee and W.-H. Tsai, ‘‘A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations’’.
- A. Anees, A. M. Siddiqui, and F. Ahmed, ‘‘Chaotic substitution for highly auto correlated data in encryption algorithm,’’.
- L. Liu, Y. Lei, and D. Wang, ‘‘A fast chaotic image encryption scheme with simultaneous permutation-diffusion operation’’.
- M. Khalili and D. Asatryan, ‘‘Colour spaces effects on improved discrete wavelet transform-based digital image watermarking using Arnold transform map,”.
- L. Zhang, J. Wu, and N. Zhou, ‘‘Image encryption with discrete fractional cosine transform and chaos.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.