Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2020, TELKOMNIKA Telecommunication Computing Electronics and Control
https://doi.org/10.12928/telkomnika.v18i5.14279…
8 pages
1 file
Cryptography is one of the paramount and most vital data treatment processes, it allows us to be secure in our electronic transactions. The process of cryptography protects our valuable data such as private account numbers and transaction amounts, electronic signatures replace handwritten signatures or credit card authorizations, and public-key encryption provides confidentiality. The objective of data encryption is to keep digital data confidentiality save as it is stored on computer systems and transferred using the internet or other computer networks. In this paper we will focus in enhancing security level of the encryption-decryption process by introducing a novel method, which uses any digital color image to encode-decode secret message, the using of a special key to encrypt-decrypt the encoded-decoded message, the color image will be known only by the transmitter and receiver to keep the process of data treatment confidential, the obtained experimental results by the proposed method will be analyzed to prove the enhancement in process efficiency and confidentiality.
2012
This paper aims at improving the level of security and secrecy provided by the digital color signal-based image encryption. The image encryption and decryption algorithm is designed and implemented to provide confidentiality and security in transmission of the image based data as well as in storage. This new proposed encryption algorithm can ensure the lossless of transmissions of images. The proposed encryption algorithm in this study has been tested on some images and showed good results.
2014
Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS).A digital envelope is data container that is used to protect a message through encryption and data authentication. A digital envelope allows users to encrypt data with the speed of secret key encryption and the convenience and security of public key encryption. In this cryptographic system, we take original and envelope image as input and divide the envelope image into even and odd numbered blocks. Even pixels of original image are being mapped into odd blocks of envelope image and odd pixels of original image are being mapped into even blocks of envelope image at the time of encryption. The decrypted image is being constructed by taking the corresponding bit position's value from the envelope image. Thus an attempt is made for increasing the security.
2013
Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS).A digital envelope is data container that is used to protect a message through encryption and data authentication. A digital envelope allows users to encrypt data with the speed of secret key encryption and the convenience and security of public key encryption. At first this cryptographic system divide the secret image by partitioning it into n number of split images.In this current work we have proposed a variable lengthSymmetric Key based Visual Cryptographic Scheme for colorimages where a Secret key is used to encrypt the every images and the Encrypted images are again encrypted by the fingerprints images. Finally every encrypted images are enveloped in other images using invisible digital watermarking.
2018
The visual cryptography is a type of cryptography that allows digital images to be divided into multiple numbers of printable shares called transparent shares. The images are transmitted after applying the visual cryptographic technique. The hacker cannot understand the distorted image and thus the data communication become secured. It exploits the human visual system to read the secret message from some overlapped shares. This technique overcomes the disadvantage of complex computations required in traditional cryptography. Visual cryptography can also be applied to color images by converting them into black and white binary images. In this research work, visual cryptographic technique is proposed and encryption and decryption are done using Blowfish algorithm. The proposed technique is implemented with Matlab coding. Keywords— Visual Cryptography, XOR, 16 standard RGB Color Image, Blowfish Algorithm, Encryption, Decryption.
Traitement du Signal
Some digital data circulated through various social media, regardless of its nature, requires high-level protection and security for various reasons. In this research, a multipurpose method will be presented to be used in encrypting SMS messages, text files regardless of their size, digital images of all kinds and sizes, and audio files of all kinds and sizes. The proposed method will be examined to prove its efficiency, and the practical results will be compared with the implementation results of other internationally approved methods to show the extent to which the method improves efficiency indicators. It will be shown how to use digital color image to generate a highly secure private key which will make the process of hacking impossible. The Quality of the encrypted and decrypted images will be examined to justify the use of the proposed method.
— Cryptography is basically concerned with keeping communications privately and secretly. Indeed, the protection of important and highly sensitive communications has been the prime motto of cryptography throughout much of its history. Encryption is the conversion of data into some spidery form. Its motto is to ensure privacy by hiding information from anyone for whom it is not intended, even those who can see the encrypted data. Decryption is the reverse of encryption. Data encryption technique converts data into a spidery format so as to protect it from external fraud entity. It is thus useful in ensuring the privacy and security of the information transferred or shared between the systems. Here, we propose a color coding RGB scheme that can be used for data encryption which represents text in the form of colored patches by grouping together binary bits and assigning them colors.
Engineering, Technology & Applied Science Research
Digital color images are considered as the most widely used data. They are exchanged frequently on the internet and via email, so an efficient and highly secure method of color image encryption and decryption is needed. Different methods of encryption-decryption are used, but most of them suffer from low efficiency or low-security level or both. In this paper, an efficient and highly secure method of encryption-decryption will be proposed, tested, and implemented. The efficiency parameters will be calculated and compared with other methods’ parameters to prove the efficiency of the proposed method.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
Nowadays multimedia system knowledge protection is changing into important. The coding technique is employed to safeguard multimedia system knowledge. There are completely different techniques wont to defend confidential image knowledge from unauthorized access. during this paper, we've got an inclination to survey existing work that's used entirely completely different techniques for image coding and that we to boot give a general introduction relating to cryptography.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. Massage communication over internet facing problems like data security, copyright control, data size capacity, authentication etc. A new idea is to apply reversible data encoding algorithms images by wishing to remove the embedded data after data receiving with the help of image pixel color value.
JOIV : International Journal on Informatics Visualization
Encryption of digital color image is the process of conversion original digital color image into an encrypted one to protect the image from hacking or to prevent an authorized person to get the valuable information located in the color image. The process of color image encryption-decryption is very important issue in human activities and here in this paper we will introduce a new simple, efficient and highly secure method to be used for color image encryption-decryption. The proposed method will be tested and implemented, the efficiency parameters of the proposed method will be calculated and will be compared with other methods parameters to prove the efficiency issues of the proposed method.
TELKOMNIKA, 2022
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
Visual Cryptography is a special encryption technique to hide information in images, which divide secret image into multiple layers. Each layer holds some information. The receiver aligns the layers and the secret information is revealed by human vision without any complex computation. The proposed algorithm is for color image, that presents a system which takes four pictures as an input and generates three images which correspond to three of the four input pictures. The decoding requires only selecting some subset of these 3 images, making transparencies of them, and stacking them on top of each other, so the forth picture is reconstructed by printing the three output images onto transparencies and stacking them together. The reconstructed image achieved in same size with original secret image.
2018
1Komal Gaikwad & Indapur 2Kshitija Kurnawal & Indapur 3Dhanashri Padase & Indapur 4Deokate S.T. & Indapur 5Salve B.S. & Indapur Student, Computer Engineering, SBPCOE Indapur, Maharashtra, India Assistant professor, Computer Engineering ,SBPCOE Indapur, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract Day by day, data broadcasting over internetworking is accelerating tremendously. As we see lot of data is abducted over network, so it necessitates providing data security. The RDH (Reversible Data Hiding) approach is intended for gray scales images previously and it cannot be directly applied to the palette image. Here, at the sender side the palette image is used as input and the encryption of image is done by using the encrypted key. In the image, alterations are done by using the color partitioning with RGB model. After performing the encryption of the intended ima...
International Journal of Engineering Research and, 2015
In this paper a new technique for image based data hiding with a binary file is proposed. In traditional methods the image based data hiding referred as steganography. The basic idea of Steganography is that it distributes the message uniformly throughout the image. But it will cause degradation to the image. In this paper the image based data hiding is performed using the binary file that ensures more security and confidentiality. Here the image is divided into blocks of equal sizes and the message is then embedded into the central pixel of the block using cyclic combination of 6 th , 7th, 8 th bit. The block of the image is chosen randomly using Array shuffling algorithm similar to pseudo random number generator seeded with an array shuffling key. In proposed method the image is divided into 256 blocks and the message is uniformly distributed in the image but there will be no change in the image pixels. The user keeps a secret binary file along with the image that contains the bits corresponding to the message. The binary file that contains bit values corresponding to the message will provides more security. The binary file is then encrypted with the same key or another key and converted to base64 encoding. And it is send to the receiver. The receiver can download the image from anywhere and the information about the image is shared by sending the URL or it may be known to the receiver. The array shuffling key is shared with the receiver by using any of the symmetric key exchange technique. Then receiver can retrieves the message by analyzing the binary file by decrypting and converting to normal utf-8 encoding from base64. In this method the image quality is maintained as such as the original image, ie the pixel value of the image does not changed. The main advantage is that it does not limit the size of message that can be distributed in the image. The message can be retrieved only with the help of image, binary file, and array shuffling key. So the security is assured.
Visual Cryptography is a special encryption technique to hide information in image in such a way that it can be decrypted by the human vision if the correct key image is used. Visual Cryptography uses two transparent images one image contains random pixels and the other image contains the secret information. It is impossible to retrieve the secret information from one of the image. Both transparent images and layers are required to reveal the information. The beauty of the Visual secret sharing scheme is its decryption process i.e. to decrypt the secret using Human Visual System (HVS) without any computation
International Journal of Computer Applications, 2014
This paper proposed a new algorithm for digital image encryption. The proposed algorithm encrypts an mxn size image by using the set of array pixel values. At the end, plain images will be encrypted using the algorithm and analysis will be performed on the ciphered images to determine the efficiency of the algorithm in ciphering the image. The algorithm ultimately makes it possible for encryption and decryption of the images to be done based on the RGB pixel. The algorithm was implemented using MATLAB.
International Journal of Network Security & Its Applications, 2012
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
Image encryption plays an important role to ensure confidential transmission and storage of image over internet. However, a real–time image encryption faces a greater challenge due to large amount of data involved. This paper presents a review on image encryption techniques of both full encryption and partial encryption schemes in spatial, frequency and hybrid domains.
— In recent period of time security of the transmitted data is most critical problem, as network technology is greatly advanced and heaps of information is transmitted via net. Visual cryptography strategy is one of the most secure technique for privacy auspices, that allow the encryption of secret image or data by transferring it into the secure percentage and such a strategy is able to recover the secret image or data. This behavior makes visual cryptography especially useful for the low computation load requirement. In this paper, we are providing the information regarding information security by using Visual Cryptography scheme by making use of exclusive new technique of splitting of images along with their pixels rotation with the help of generated random number. We also have made an attempt to overcome some of the disadvantages of preexisting techniques of encryption and decryption. Finally, successful transmission of the message from transmitting end to receiving end without any interception was done. Most importantly, it is very difficult to hack by use of any professional hacking techniques as the message is encrypted twice. Hence the data is highly secured under transmission path.
With the tremendous and rapid growth of information interchange through internet transmission, information security has become a major issue to deal with. As because images are being used more in business and industrial process, military and medical and also in scientific researches, it has become the important factor to protect the confidential image data from unwanted access or intruders. Because of development of technology, the hacking techniques, and attacks are also becoming more and more intelligent. As a result, traditional approaches of image encryption are failing to be a good competitor with the attackers. Image encryption has been a wide area of research field. The protection of image data is more important because it contains maximum features of a person or thing. Image encryption is employed to protect an image from unauthorized access and increase image security over internet. Nowadays Internet is used for transmitting and storing huge amount of information. Since the internet has many loopholes and several scopes of hacking or being attacked by intruders. So, our personal and private image need to be protected during transmission over internet. Researches have done satisfactory numbers of researches and developed lots of image encryption algorithms till now. In this paper, we illustrated a brief survey of some significant works regarding image encryption techniques in different domains and our main perspective will be to come up with a better solution to make images more secure in the future.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.