Quantcast
Channel: Number 1
Viewing all articles
Browse latest Browse all 16

Grid-based Image Encryption using RSA

$
0
0
{tag} {/tag}
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 115 - Number 1
Year of Publication: 2015
Authors:
Binay Kumar Singh
Sudhir Kumar Gupta
10.5120/20116-2166
{bibtex}pxc3902166.bib{/bibtex}

Abstract

In recent years, security of several kinds of images is a major issue in secure data communication over any unreliable network. In this paper, a new technique to secure images by using grid-based encryption and decryption approach with RSA cryptosystem has been devised. This approach has taken original image, performed block transformation followed by grid transformation, then finally a public key cryptosystem is applied pixel-by-pixel to secure image. Experimental images have been taken and performed encryption and decryption to elaborate this technique. Error analysis shows that the technique is robust.

References

  • Biryukov A. , Kushilevitz E. Proceedings of CRYPTO'98, 1462:72-88, 1998. From differential cryptanalysis to cipher-only attacks.
  • Rivest R. , Shamir A. , Adleman L. Communications of the ACM, Feb 1978. A method for obtaining digital signatures and public key cryptosystems.
  • Lamba C. S. , Second International Conference on Communication Software and Networks, 2010. Design and Analysis of Stream Cipher for Network Security.
  • Lian, Shiguo. CRC Press, 2008. Multimedia Content Encryption: Algorithms and Application.
  • Stallings W. 4th edition, Pearson Education Inc, 2006. Cryptography and Network Security Principles and Practices.
  • Ding, W. and Marchionini, G. 1997. A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  • C. Kaufman, R. Perlman, M. Speciner. Prentice Hall 1995. Network security.
  • Rivest, Ronald L. Shmir A. Len A. MIT Laboratory for Computer Science Technical Memorandum 82 (April 1977). On Digital Signatures and Public Key Cryptosystems.
  • Flinn, Patrick J. and Jordan, James M. Alston & Bird LLP, July 9, 1997. Using the RSA Algorithm for Encryption and Digital Signatures: Can You Encrypt, Decrypt, Sign and Verify without Infringing the RSA Patent?
  • Juneja Mamta, Sandhu Parvinder S. International Conference on Advances in Recent Technologies in Communication and Computing, Pages No. 302 – 305, 27-28 Oct. , 2009. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption.
  • Paar Christof, Pelzl Jan. ISBN 978-3-642-04100-6, Springer, 2010. Understanding Cryptography.
  • Furht Borko, Kirovski Darko. ISBN: 0-8493-7212-7, 2006. Multimedia Encryption and Authentication Techniques and Applications.
  • Katz Jonathan, Lindell Yehuda. ISBN: 978-1-58488-551-1, 2008. Introduction to Modern Cryptography: Principles and Protocols.
  • Hoffstein Jeffrey, Pipher Jill, Silverman Joseph H. ISBN: 978-0-387-77993-5, 2008. An Introduction to Mathematical Cryptography.

Viewing all articles
Browse latest Browse all 16

Trending Articles