Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
AI
The paper analyzes the performance of three color-based cryptographic algorithms, specifically focusing on their encryption and decryption times. It highlights the significance of color in cryptography due to the versatility of the human visual system and the rise of multimedia data. Comparisons of the algorithms' efficiencies are presented through quantitative results, illustrating time differences in processing various file sizes, ultimately advocating for the potential applications of color in secure communications.
A new cryptography algorithm based on Unicode and Universal colors is proposed to preserve the confidentiality of the data. The use of Unicode as encoding scheme provides support to a very large range of characters. The colors are used to obtain a large key domain to avoid cryptanalyst attacks like brute-force and dictionary attacks. The concept is based on the symmetric key cryptography that supports the use of a single shared key between the sender and receiver for encryption and decryption. The algorithm is an approach that uses the simple concepts of substitution and transposition. The algorithm is devised using operations that are directly supported by the processor to limit the processing time taken by the algorithm to perform the required task. The security of the algorithm is analyzed and the experimental results obtained approve the effectiveness and usability of the algorithm.
RGB color oriented cryptography is a new research area in data security. In this paper a new approach to encrypt and decrypt information independent of the language using colors is proposed. The message of any language consists of set of Characters, Symbols, and Digits, and is encoded using UNICODE, so that any language can be encrypted. The UNICODE value of each character in the message is encrypted using the RGB color encryption method and is then compressed. Each cipher color has an equivalent hexadecimal value. This hexadecimal values is converted into its binary equivalent form. The binary values thus obtained are divided into two equal parts. The first part is treated as message and the second part is treated as key. XOR operation is applied between the two parts and thus achieving compression. In order to secure the key is encrypted using the RSA encryption algorithm. The last step of this proposed algorithm is optional, the cipher message is again encrypted to cipher color and then send through the insecure channel. If we want to hide the color information avoid this last step.
With the growth of communication/transaction over internet and continuous efforts by cryptanalysts there is a continuous need for strong cryptographic algorithms. The primary goal, for designing such algorithms, is to provide security. However, performance and implementation ease and execution time are other factors that make an algorithm more usable. An improved encryption model, which is an extension of an existing encryption algorithm based on UNICODE and Colors map can be used. The cipher text that is generated by using improved encryption model is of the same size as the plain text and it will be suitable for practical use in the secure transmission of confidential information over the Internet.
International Journal of Computer Applications, 2014
The emerging threats to information security are increasing at an alarming rate. The most influential and universal approach to counter such threats is encryption. Traditional encryption techniques use substitution and transposition. Substitution techniques map plaintext into ciphertext. In all traditional substitution techniques, characters, numbers and special symbols are substituted with other characters, numbers and special symbols. In this paper, an innovative cryptographic substitution method is proposed to generate a stronger cipher than the existing substitution algorithms. This method emphasizes on the substitution of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher. The cryptanalysis done on this will prove that the cipher is strong.
— Cryptography is basically concerned with keeping communications privately and secretly. Indeed, the protection of important and highly sensitive communications has been the prime motto of cryptography throughout much of its history. Encryption is the conversion of data into some spidery form. Its motto is to ensure privacy by hiding information from anyone for whom it is not intended, even those who can see the encrypted data. Decryption is the reverse of encryption. Data encryption technique converts data into a spidery format so as to protect it from external fraud entity. It is thus useful in ensuring the privacy and security of the information transferred or shared between the systems. Here, we propose a color coding RGB scheme that can be used for data encryption which represents text in the form of colored patches by grouping together binary bits and assigning them colors.
In the increasing concern of the data security ,most commonly method is encryption of messege to cipher text message ,which are based on various strategies to encode. traditional method is to convert the message to cipher text by substitution , swapping ,transposition etc. Transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. Whereas ,we are using an innovative cryptographic substitution method. where we proposed to generate a stronger cipher than the existing substitution algorithms. This method emphasizes on the substitution of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher.As there are n decillion of color with wide range of shades are available so the complexity for the attacker increase and that gives the assurance of strong cipher.
2016
The threats to information security have been incrementing at an astounding rate. The most influential approach used for countering such threats is encryption. Various encryption techniques are classified into substitution and transposition techniques. In all conventional substitution techniques; the numbers, characters and special symbols are substituted with other numbers, characters and special symbols. An unprecedented cryptographic substitution method is proposed to generate a stronger cipher than the existing substitution algorithms. This algorithm of substitution is based on Play Color Cipher. Furthermore, asymmetric RSA algorithm is used to make the PCC key more secure and robust. The system will prove that the cipher is strong. A translator is used to enable multiple language input as plain text.
Journal of Applied Intelligent System, 2020
This study proposes securing digital color images with hybrid substitution cryptographic methods combined with the Vigenere and Beaufort methods. The hybrid process is carried out using the help of two randomly generated keys. The first key is a matrix with an 8-bits value and the second key is a matrix with a binary value. The binary key is used to determine the Vigenere or Beaufort process, while the 8-bit key is used for modulus operations based on the Vigenere or Beaufort algorithm. At the test stage used a standard image that has an RGB color channel as a dataset. The quality of the cryptographic method is measured by several measuring instruments such as MSE, PSNR, and SSIM to determine the quality of encryption visually and the perfection of decryption, besides that it is used Entropy, NPCR and UACI to determine the probability of encryption resistance and quality against differential attacks. The TIC TOC function is also used to measure the computing speed of the encryption ...
Engineering, Technology & Applied Science Research
Digital color images are considered as the most widely used data. They are exchanged frequently on the internet and via email, so an efficient and highly secure method of color image encryption and decryption is needed. Different methods of encryption-decryption are used, but most of them suffer from low efficiency or low-security level or both. In this paper, an efficient and highly secure method of encryption-decryption will be proposed, tested, and implemented. The efficiency parameters will be calculated and compared with other methods’ parameters to prove the efficiency of the proposed method.
The rising threats to information security are increasing at an alarming rate. The most powerful and universal approach to counter such threats is encryption. Conventional encryption techniques use substitution and transposition. Substitution technique change plaintext into cipher text. In all conventional substitution techniques characters, numbers and special symbols are replaced with other characters, numbers and special symbols. In this project, an innovative substitution method is proposed to generate a better cipher than the existing substitution algorithms. This method re-emphasizes on the substitution of characters, numbers and special symbols/characters with color blocks. This project is based on Play Color Cipher. The crypt-analysis is done on this will prove that the cipher is strong.
JOIV : International Journal on Informatics Visualization
Encryption of digital color image is the process of conversion original digital color image into an encrypted one to protect the image from hacking or to prevent an authorized person to get the valuable information located in the color image. The process of color image encryption-decryption is very important issue in human activities and here in this paper we will introduce a new simple, efficient and highly secure method to be used for color image encryption-decryption. The proposed method will be tested and implemented, the efficiency parameters of the proposed method will be calculated and will be compared with other methods parameters to prove the efficiency issues of the proposed method.
2012
This paper aims at improving the level of security and secrecy provided by the digital color signal-based image encryption. The image encryption and decryption algorithm is designed and implemented to provide confidentiality and security in transmission of the image based data as well as in storage. This new proposed encryption algorithm can ensure the lossless of transmissions of images. The proposed encryption algorithm in this study has been tested on some images and showed good results.
2018
Visual cryptography, a popular and simple technique uses the characteristics of human vision to decrypt encrypted images. It requires no computation for decryption from the user end. This paper emphasizes on basic cryptographic scheme proposed by Naor and Shamir with changed shares. Here, we focus on different shares with different combination of CMY color scheme to check whether proper encryption has taken place. Different combinations of shares were employed and the contrast reduction for decrypted images was 50% for some of the combinations which were also achieved earlier. Most of these studies, however, concentrated on binary images but very few on grayscale and color images. In this paper, a technique is presented to apply the visual cryptography scheme on colored images.
IJCSMC, 2019
Color image encryption-decryption is an important issue, because it is used in many important applications. This paper will introduce 3 methods of image encryption-decryption, these methods will be implemented and tested, and the obtained experimental results will be compared with experimental results of the proposed method in order to do some judgment regarding the efficiency and the security of the proposed method.
Today the transmission of multimedia data including image and video is growing in telecommunications. Security is one of the main issues in transferring such sensitive information. Powerful image encryption algorithm is the solution for this problem. This paper is an implementation of a color image encryption algorithm based on Rubik's cube technique. The Rubik's cube technique is used for pixel permutation and a bit substitution method based on DNA sequences are used to change the value of each pixel on the image. Then the time-stamp is appended with encrypted image, which can be used to identify the replay attack. For evaluating the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation analysis, analysis of NPCR and UACI values etc.
Image encryption plays an important role to ensure confidential transmission and storage of image over internet. However, a real–time image encryption faces a greater challenge due to large amount of data involved. This paper presents a review on image encryption techniques of both full encryption and partial encryption schemes in spatial, frequency and hybrid domains.
2013
In this paper a novel block cipher is developed with play color cipher algorithm. In it a alphanumeric key of 32 character is used with transposition and substitutions. These mutate the plain text by many ways before cipher text takes the shape. The encryption, decryption, key generation is explained with suitable example. The cipher is very strong as it is indicated by examining the cryptanalysis.
International Journal of Intelligent Engineering and Systems, 2021
This study proposes the hybrid substitution cryptography method followed by chaotic methods to improve the security of digital image transactions on the internet. The substitution method used is a hybrid of the modification of the Vigenère and Beaufort cipher algorithm. To do a hybrid, two random keys are used. The first random key is a matrix with 8-bits integer values, while the second random key is a matrix that contains binary values. The modulus operation is used in the main process of substitution methods. In this study, 24-bits true-color images were used as a dataset for the testing experiment. Measurement of encryption quality is measured by Entropy, MSE, PSNR, SSIM, UACI, and NPCR, whereas tic toc functions for measuring the computational time needed. To ensure the decryption process runs perfectly, measuring instruments such as SSIM, MSE, and PSNR are used to compare the decrypted image with the original image, the tic toc function is also used to measure computing performance. Based on the results of testing the quality of image encryption proved to have excellent results where the entropy value is very close to 8, the ideal NPCR and UACI values, as well as excellent visual values based on MSE, PSNR, and SSIM measurements. The image can also be decrypted perfectly with relatively fast computing time in the encryption and decryption process.
Wireless Communications and Mobile Computing
Issues such as inefficient encryption architectures, nonstandard formats of image datasets, weak randomness of chaos-based Pseudorandom Number Generators (PRNGs), omitted S-boxes, and unconvincing security metrics leading to increased computational time and inadequate security level of chaos and Deoxyribonucleic Acid- (DNA-) based image encryption schemes need careful examination towards the development of more stable encryption schemes in terms of efficiency and reasonable security. A new taxonomy of image encryption based on chaotic systems, hyperchaotic systems, and DNA is propounded to assess the impact of these issues on the performance and security metrics. The primary emphasis of this research is to study various recent encryption architectures centered on a variety of confusion and diffusion methods. It is aimed at assessing the performance and security of various ciphers using a cipher rating criterion that categorizes ciphers into different classes. The parameters that are...
2018
The visual cryptography is a type of cryptography that allows digital images to be divided into multiple numbers of printable shares called transparent shares. The images are transmitted after applying the visual cryptographic technique. The hacker cannot understand the distorted image and thus the data communication become secured. It exploits the human visual system to read the secret message from some overlapped shares. This technique overcomes the disadvantage of complex computations required in traditional cryptography. Visual cryptography can also be applied to color images by converting them into black and white binary images. In this research work, visual cryptographic technique is proposed and encryption and decryption are done using Blowfish algorithm. The proposed technique is implemented with Matlab coding. Keywords— Visual Cryptography, XOR, 16 standard RGB Color Image, Blowfish Algorithm, Encryption, Decryption.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.