Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
— Cryptography is basically concerned with keeping communications privately and secretly. Indeed, the protection of important and highly sensitive communications has been the prime motto of cryptography throughout much of its history. Encryption is the conversion of data into some spidery form. Its motto is to ensure privacy by hiding information from anyone for whom it is not intended, even those who can see the encrypted data. Decryption is the reverse of encryption. Data encryption technique converts data into a spidery format so as to protect it from external fraud entity. It is thus useful in ensuring the privacy and security of the information transferred or shared between the systems. Here, we propose a color coding RGB scheme that can be used for data encryption which represents text in the form of colored patches by grouping together binary bits and assigning them colors.
Network Security has become very important in today's world, as a result of which various methods are adopted to bypass it. Network administrators need to keep up with the recent advancements in both the hardware and software fields to prevent their as well as the user's data. The paper briefly introduces the concept of data security i.e. a manually generated shift key based cryptographic technique which (de)ciphers the fragmented plain text. Here both encryption and decryption methodologies are proposed. The paperwork outlines a cryptographic algorithm based on a user defined shift key modus operandi engendering ciphers at bay. First, it creates an IDT (Induced Dynamic Table) to refer the position of the plain text characters. Then the next cipher is fabricated by setting the ART (Axis Rotation Table) according to the shift key. Subsequently, the further cipher is induced by a FFC (Four Face Cube). Later, the new partial cipher text characters are put into a definite sequence to get the standard color palette in RGB format. Hence, our final cipher with the shift key characters at the additional first and last color respectively in RGB format is generated. During decryption methodology, the color is selected and is opened in the standard color palette. The RGB values of the special characters has their own signature to what makes them different from the other plain characters in the time of decryption. The proposed methodology ensures significant use in both, data transfer and network security.
RGB color oriented cryptography is a new research area in data security. In this paper a new approach to encrypt and decrypt information independent of the language using colors is proposed. The message of any language consists of set of Characters, Symbols, and Digits, and is encoded using UNICODE, so that any language can be encrypted. The UNICODE value of each character in the message is encrypted using the RGB color encryption method and is then compressed. Each cipher color has an equivalent hexadecimal value. This hexadecimal values is converted into its binary equivalent form. The binary values thus obtained are divided into two equal parts. The first part is treated as message and the second part is treated as key. XOR operation is applied between the two parts and thus achieving compression. In order to secure the key is encrypted using the RSA encryption algorithm. The last step of this proposed algorithm is optional, the cipher message is again encrypted to cipher color and then send through the insecure channel. If we want to hide the color information avoid this last step.
International Journal of Computer Applications, 2014
Today most data is stored & transferred from mobile device like laptops. These devices are prone to theft, also we transfer the data via network which is not secured. All above reasons forms the backbone for our paper which implements an encryption scheme and color encoding for such mobile devices; it uses location based key formation. This key is used to encrypt data will ACIII value of Cipher text is used in color encoding of the encrypted data. This color encoded document can be saved as jpeg, jpg and send in a secure manner as an email attachment
The rising threats to information security are increasing at an alarming rate. The most powerful and universal approach to counter such threats is encryption. Conventional encryption techniques use substitution and transposition. Substitution technique change plaintext into cipher text. In all conventional substitution techniques characters, numbers and special symbols are replaced with other characters, numbers and special symbols. In this project, an innovative substitution method is proposed to generate a better cipher than the existing substitution algorithms. This method re-emphasizes on the substitution of characters, numbers and special symbols/characters with color blocks. This project is based on Play Color Cipher. The crypt-analysis is done on this will prove that the cipher is strong.
Data Security with Colors using RSA technique that integrates the RGB Color model with the well-known public key cryptographic algorithm RSA (Rivest, Shamir and Adleman). This model provides both confidentiality and authentication to the data sent across the network. RSA algorithm uses public key and private key to encrypt and decrypt the data and thus provides confidentiality. But the public key is known to everyone and so anyone can encrypt the data and send the message. Hence authentication of users is needed. In this technique we use RGB color model to provide authentication. Every user will have a unique color assigned to him. A sender must know the receiver’s color to send a message. The color value is encrypted using a key which is used as a password while decrypting the message. To decrypt the message, the receiver must provide his color values. If the decrypted color values and his color values are equal then the sender and receiver are send to be authentic. The data encryption and decryption follows RSA procedure. Thus both authentication and confidentiality are provided for the data.
International journal of engineering research and technology, 2018
In real world, data security plays an important role where confidentiality, authentication, integrity, non repudiation are given importance. This paper provides a technique to encrypt the data using a key involving Armstrong numbers and colors as the password. Three set of keys are used to provide secure data transmission with the colors acting as vital security element thereby providing authentication. To ensure secured data transmission there are several techniques being followed. One among them is cryptography which is the practice and study of hiding information. Encryption and decryption require the use of some secret information, usually referred to as a key. Depending on the encryption mechanism used, the same key might be used for both encryption and decryption, while for other mechanisms, the keys used for encryption and decryption might be different. Now any color is the combination of three primary colors Red, Green and Blue in fixed quantities. A color is stored in a com...
iaeme
Visual cryptography is a method for protecting image based secrets that has a computation-free decoding process. In this paper, we propose a new visual cryptography scheme for color images based on CMY model, half toning technique and the traditional binary image sharing scheme. The image shares generated by our method are transmitted to the destination through a network and the image is decrypted by stacking any two transparencies. The image can be in any standard format. This scheme provides an efficient way to hide the natural image among different shares. Furthermore, the size of the shares and the implementation complexity do not depend on the number of colors appearing in the secret image.
In the increasing concern of the data security ,most commonly method is encryption of messege to cipher text message ,which are based on various strategies to encode. traditional method is to convert the message to cipher text by substitution , swapping ,transposition etc. Transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. Whereas ,we are using an innovative cryptographic substitution method. where we proposed to generate a stronger cipher than the existing substitution algorithms. This method emphasizes on the substitution of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher.As there are n decillion of color with wide range of shades are available so the complexity for the attacker increase and that gives the assurance of strong cipher.
International Journal of Computer Applications, 2014
The emerging threats to information security are increasing at an alarming rate. The most influential and universal approach to counter such threats is encryption. Traditional encryption techniques use substitution and transposition. Substitution techniques map plaintext into ciphertext. In all traditional substitution techniques, characters, numbers and special symbols are substituted with other characters, numbers and special symbols. In this paper, an innovative cryptographic substitution method is proposed to generate a stronger cipher than the existing substitution algorithms. This method emphasizes on the substitution of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher. The cryptanalysis done on this will prove that the cipher is strong.
2012
This paper aims at improving the level of security and secrecy provided by the digital color signal-based image encryption. The image encryption and decryption algorithm is designed and implemented to provide confidentiality and security in transmission of the image based data as well as in storage. This new proposed encryption algorithm can ensure the lossless of transmissions of images. The proposed encryption algorithm in this study has been tested on some images and showed good results.
With the tremendous and rapid growth of information interchange through internet transmission, information security has become a major issue to deal with. As because images are being used more in business and industrial process, military and medical and also in scientific researches, it has become the important factor to protect the confidential image data from unwanted access or intruders. Because of development of technology, the hacking techniques, and attacks are also becoming more and more intelligent. As a result, traditional approaches of image encryption are failing to be a good competitor with the attackers. Image encryption has been a wide area of research field. The protection of image data is more important because it contains maximum features of a person or thing. Image encryption is employed to protect an image from unauthorized access and increase image security over internet. Nowadays Internet is used for transmitting and storing huge amount of information. Since the internet has many loopholes and several scopes of hacking or being attacked by intruders. So, our personal and private image need to be protected during transmission over internet. Researches have done satisfactory numbers of researches and developed lots of image encryption algorithms till now. In this paper, we illustrated a brief survey of some significant works regarding image encryption techniques in different domains and our main perspective will be to come up with a better solution to make images more secure in the future.
Visual Cryptography is a special encryption technique to hide information in images, which divide secret image into multiple layers. Each layer holds some information. The receiver aligns the layers and the secret information is revealed by human vision without any complex computation. The proposed algorithm is for color image, that presents a system which takes four pictures as an input and generates three images which correspond to three of the four input pictures. The decoding requires only selecting some subset of these 3 images, making transparencies of them, and stacking them on top of each other, so the forth picture is reconstructed by printing the three output images onto transparencies and stacking them together. The reconstructed image achieved in same size with original secret image.
International Journal of Science and Research (IJSR)
Secret sharing is a method for distributing a secret among a group of participants. Visual Cryptography is a form of Visual Secret Sharing proposed by Moni Naor and Adi Shamir. Visual Cryptography Schemes hide the secret image into two or more images which are called shares. The secret image can be recovered simply by stacking the shares together without any complex computation involved. Color Visual Cryptography encrypts a color secret message into color halftone image shares. In this paper the various Visual Cryptography schemes are discussed and try to summarize the recent developments in Color Visual Cryptography technology.
Engineering, Technology & Applied Science Research
Digital color images are considered as the most widely used data. They are exchanged frequently on the internet and via email, so an efficient and highly secure method of color image encryption and decryption is needed. Different methods of encryption-decryption are used, but most of them suffer from low efficiency or low-security level or both. In this paper, an efficient and highly secure method of encryption-decryption will be proposed, tested, and implemented. The efficiency parameters will be calculated and compared with other methods’ parameters to prove the efficiency of the proposed method.
Image encryption plays an important role to ensure confidential transmission and storage of image over internet. However, a real–time image encryption faces a greater challenge due to large amount of data involved. This paper presents a review on image encryption techniques of both full encryption and partial encryption schemes in spatial, frequency and hybrid domains.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. Massage communication over internet facing problems like data security, copyright control, data size capacity, authentication etc. A new idea is to apply reversible data encoding algorithms images by wishing to remove the embedded data after data receiving with the help of image pixel color value.
Al-Ma'mon College Journal, 2015
In this paper a simple and fast algorithm that used XOR function to encrypt color images compressed with a fast fractal image compression (FFIC)was used. The algorithm first included converting the image from the RGB color space into the YIQ color space and each band was treated separately. Main difficulty with fractal coding method is that it takes long time to compress single image. The FIC is speeded up by filtration of the domain pool blocks using the centralized moments coefficients which are applied to each of range and domain blocks. Another speeding is applied by using these descriptors to determine the suitable symmetry case reducing the eight isometric trails to one trail. After finding the fractal coefficients for the best matching, two of the fractal coefficient are encrypted using XOR operation. The first key encryption is used to generate an array of sequenced numbers with an increase depending on the key, and length of the array is equal to the number of the range blocks, this key is used to encrypt the average coefficients. The symmetry coefficients are encrypted by another key. Then quantization, deferential pulse code modulation(DPCM) process are applied to each of the fractal coefficient. The decryption procedure is similar to that of the encryption but in the reversed order. The proposed method provided fast, good compression ratio (CR), secure image and good quality for the reconstructed image after decompression and decryption process.
Measurement, 2014
Visual cryptography is an important technique for image encryption. This paper proposes a color transfer scheme which can be incorporated into the (k, n) visual cryptography model. In encoder, a color image is encrypted into n noise-like binary share images. When any k or more than k shares are collected, a high quality colorful version of the secret image can be reconstructed with low complexity computations. The principle is motivated to develop a color image secret sharing for output devices such as monochrome printer or fax machines. The generated share images are still binary transparencies which can be directly produced by these low cost output devices. Meanwhile, the security of a (k, n) visual cryptography model is perfectly preserved. When stacking a qualified set of transparencies, the gray level version of secret content can be revealed by human visual system. Nevertheless, the proposed paradigm is cheating immune. It also can be integrated into some emerging display technologies such as cholesteric liquid crystal display. Experimental results and related examples demonstrate the effectiveness and efficiency.
A new cryptography algorithm based on Unicode and Universal colors is proposed to preserve the confidentiality of the data. The use of Unicode as encoding scheme provides support to a very large range of characters. The colors are used to obtain a large key domain to avoid cryptanalyst attacks like brute-force and dictionary attacks. The concept is based on the symmetric key cryptography that supports the use of a single shared key between the sender and receiver for encryption and decryption. The algorithm is an approach that uses the simple concepts of substitution and transposition. The algorithm is devised using operations that are directly supported by the processor to limit the processing time taken by the algorithm to perform the required task. The security of the algorithm is analyzed and the experimental results obtained approve the effectiveness and usability of the algorithm.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.