Abstract

Digital networks present a number of interesting research problems, one of which is the secure image transfer through various channels of communication. In these circumstances, cryptography algorithms are commonly employed to securely encrypt and decode data at both the sending and receiving ends. To determine the most effective method of image encryption, a wide range of modern algorithms are analysed and compared. In this study, we describe several fuzzy modes of operation for image encryption. It guarantees the safety of digital image transfer. The work's goal is to provide the most trustworthy image encryption possible; This is achieved by integrating image encryption methods into a hybrid fuzzy based architecture. The proposed composite fuzzy-based encrypted systems (CFES) are recommended for use in order to ensure the security of data on various communications media. The composite fuzzy-based encrypted systems provide strong security while yet protecting users' privacy while viewing image content.

Details

Title
Secure Image Encryption Techniques with Fuzzy based Operation Modes for Trustworthy Accessing in Communication Devices
Author
Kolla, Morarjee 1 ; Prasad, K Rajendra 2 ; Sreenivasulu, K 3 ; Mohan, Y Rama 4 ; Kumar, Chatakunta Praveen 5 

 Department of CSE, Chaitanya Bharathi Institute of Technology, Hyderabad, Telangana, India 
 Department of CSE, Institute of Aeronautical Engineering, Dundigal, Hyderabad, Telangana, India 
 Pullaiah college of Engineering and Technology, Kurnool 
 Dept, G. Pulla Reddy Engineering College, Kurnool 
 Dept, of CSE, Institute of Aeronautical Engineering, Dundigal, Hyderabad, Telangana, India 
Pages
34-45
Publication year
2024
Publication date
2024
Publisher
Engineering and Scientific Research Groups
e-ISSN
11125209
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
3073675661
Copyright
© 2024. This work is published under https://creativecommons.org/licenses/by/4.0/legalcode (the“License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.