Encryption algorithms on BMP and JPEG images
SARA CHILLALI, LAHCEN OUGHDIR
Sidi Mohamed Ben Abdellah University
FP, LSI, TAZA, MOROCCO
Abstract: - In this article we carried out a comparative study between certain encryption algorithms on BMP
and JPEG images, we established a comparison between certain types of encryption systems and our algorithm.
We made the comparison with data implemented on the same computer and our implementation.
Key-Words: -Image, Algorithm, Encryption, Comparative.
Received: March 16, 2021. Revised: January 7, 2022. Accepted: January 25, 2022. Published: February 18, 2022.
1 Introduction
As you The need for disk space envisaged by the
storage or the transmission of a digital image or any
other graphic form comprising thousands of bytes
and at a rate more than 500 images per day, we let
think about the good encryption of this data
produced for stokers in a confidential way, without
someone being able to see or use them other than
those who have the right of access. This problem is
supposed to be solved by a few encryption
algorithms. In order to prove the performance of our
encryption algorithm, we made a comparison
between some algorithms already implemented and
our.
The comparison will be made on several points and
according to certain criteria; (see [4, 5]):
• Type and size of keys.
• The visibility and performance of the encryption
operation applied to the image.
• The encryption and decryption time.
• Type and size of images (BMP or JPEG).
• Comparison graph.
For symmetrical systems:
Simple algorithms use any keys.
Secret key algorithms:
DES (64 bits)
3-WAY (96 bit)
RC5 (128 bit)
IDEA (128 bit)
On the other hand, asymmetric systems call on
arithmetic operations based on finite fields, the
factorization of large numbers into two prime
numbers, elliptic curves ..., the size of an RSA key
of 1024 bits corresponding to a size of 256 bits for
elliptical curves.
2 Encryption and Decryption
Algorithms
2.1 Problem Formulation
Find a method of encryption and decryption to keep
encrypted images without anyone being able to see
or use them other than those who have the rights of
access to information, add more these methods must
be effective and better than the already existing.
2.2 Problem Solution
In our article [1, 2], we established an encryption
method based on matrices, in this part we present
another method using elliptic curves.
Let an elliptic curve on the field where
is a large prime number, such that discrete logarithm
problem in is difficult. [2, 6]
Using a Diffie–Hellman key exchange, see [2, 3], on
such a chosen curve we can build a secret key
which allows us to generate a secret matrix to
encrypt and decrypt our images. Suppose Ali has
created such a secret key and shares it
with the people who have the right to access the
WSEAS TRANSACTIONS on SIGNAL PROCESSING
DOI: 10.37394/232014.2022.18.3
Sara Chillali, Lahcen Oughdir