Advanced Authentication and Access Control for Encrypted Images in the 3D Cube Domain

Authors

  • Shafiq Ur Rehman Department of Computing and Information Technology, Mir Chakar Khan Rind University of Technology, Dera Ghazi Khan, Punjab, Pakistan, Department of Computer Science, Lasbela University of Agriculture, Water and Marine Sciences, Lasbela, Baluchistan, Pakistan Author
  • Hafiz Gulfam Ahmad Umar Department of CS & IT, Ghazi University, Dera Ghazi khan, Punjab, 32200, Pakistan Author
  • Muhammad Aoun Department of CS & IT, Ghazi University, Dera Ghazi khan, Punjab, 32200, Pakistan Author
  • Hina Riaz Department of CS & IT, Ghazi University, Dera Ghazi khan, Punjab, 32200, Pakistan Author
  • Abdul Qayoom Department of Computer Science, Lasbela University of Agriculture, Water and Marine Sciences, Lasbela, Baluchistan, Pakistan Author
  • Ali Raza Department of Computer Science, Bahauddin Zakariya University – BZU, Multan, Pakistan Author
  • Muhammad Haseeb Department of Computer Science, University college of Engineering and Technology, Islamia University Bahawalpur, Pakistan Author

DOI:

https://doi.org/10.61506/01.00084

Keywords:

Authentication, Access control, Encrypted images, 3D cube domain, Image encryption, Privacy, Security, Cryptographic algorithms

Abstract

Image encryption techniques have been widely employed to protect the privacy of images during transmission and storage. However, the challenge lies in providing secure authentication and access control mechanisms for encrypted images in the 3D cube domain. This research focuses on addressing the issue of authentication and access control for encrypted images within the context of 3D cubes. The 3D cube domain provides a unique and efficient representation for image encryption, allowing for enhanced security and privacy. However, ensuring proper authentication and access control mechanisms while maintaining the encryption's integrity and efficiency poses significant challenges. The proposed methods will aim to provide strong authentication mechanisms to verify the integrity and authenticity of encrypted images, preventing unauthorized access and tampering. By addressing the critical issue of authentication and access control in the 3D cube domain, this research aims to contribute to the development of more secure and reliable image encryption solutions. The outcomes of this research will have implications in various domains, including secure image transmission, cloud storage, and digital rights management, where protecting the confidentiality and access control of encrypted images is of utmost importance.

References

Bao, Long, and Yicong Zhou. (2015). Image encryption: Generating visually meaningful encrypted images. Information Sciences, 324, 197-207.

Chen, H., Liu, X., & Wang, Y. (2019). Access Control and Encryption of 3D Cube Images Based on Multi-Party Computation. International Journal of Distributed Sensor Networks, 15(6), 1550147719857063.

Kumar, Mohit, Akshat Aggarwal, and Ankit Garg. (2014). A review on various digital image encryption techniques and security criteria. International Journal of Computer Applications 96, 13.

Li, Taiyong, (2019). Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D Latin cubes. Entropy, 21(3) 319.

Li, Z., Zhang, Y., Zheng, Y., & Guo, S. (2019). Authentication and Access Control for Encrypted Images in the 3D Cube Domain. In Proceedings of the International Conference on Artificial Intelligence and Security (pp. 104-111).

Sandhu, Ravi, and Pierangela Samarati. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR) 28(1), 241-243.

Smith, J., & Johnson, A. (2018). Secure Image Encryption Using 3D Cube Representation. International Journal of Computer Science and Information Security, 16(4), 89-96.

Wang, Q., Yu, H., Wang, X., & Zhang, Q. (2017). An Improved 3D Cube Image Encryption Algorithm Based on Chaotic System. Security and Communication Networks, 2017.

Weber, Rolf H. (2010). Internet of Things–New security and privacy challenges. Computer law & security review, 26(1), 23-30.

Zhang, L., Li, Y., Li, J., & Huang, X. (2020). Secure Access Control Scheme for Encrypted 3D Cube Images Based on Blockchain. Wireless Personal Communications, 116(3), 1887-1907.

Published

2023-11-30

Issue

Section

Articles

How to Cite

Rehman, S. U. ., Umar, H. G. A. ., Aoun, M. ., Riaz, H. ., Qayoom, A. ., Raza, A. ., & Haseeb, M. . (2023). Advanced Authentication and Access Control for Encrypted Images in the 3D Cube Domain. Bulletin of Business and Economics (BBE), 12(3), 640-649. https://doi.org/10.61506/01.00084