{tag}
{/tag}
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 115 - Number 1
Year of Publication: 2015
![]() |
10.5120/20116-2166 |
{bibtex}pxc3902166.bib{/bibtex}
Abstract
In recent years, security of several kinds of images is a major issue in secure data communication over any unreliable network. In this paper, a new technique to secure images by using grid-based encryption and decryption approach with RSA cryptosystem has been devised. This approach has taken original image, performed block transformation followed by grid transformation, then finally a public key cryptosystem is applied pixel-by-pixel to secure image. Experimental images have been taken and performed encryption and decryption to elaborate this technique. Error analysis shows that the technique is robust.
References
- Biryukov A. , Kushilevitz E. Proceedings of CRYPTO'98, 1462:72-88, 1998. From differential cryptanalysis to cipher-only attacks.
- Rivest R. , Shamir A. , Adleman L. Communications of the ACM, Feb 1978. A method for obtaining digital signatures and public key cryptosystems.
- Lamba C. S. , Second International Conference on Communication Software and Networks, 2010. Design and Analysis of Stream Cipher for Network Security.
- Lian, Shiguo. CRC Press, 2008. Multimedia Content Encryption: Algorithms and Application.
- Stallings W. 4th edition, Pearson Education Inc, 2006. Cryptography and Network Security Principles and Practices.
- Ding, W. and Marchionini, G. 1997. A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
- C. Kaufman, R. Perlman, M. Speciner. Prentice Hall 1995. Network security.
- Rivest, Ronald L. Shmir A. Len A. MIT Laboratory for Computer Science Technical Memorandum 82 (April 1977). On Digital Signatures and Public Key Cryptosystems.
- Flinn, Patrick J. and Jordan, James M. Alston & Bird LLP, July 9, 1997. Using the RSA Algorithm for Encryption and Digital Signatures: Can You Encrypt, Decrypt, Sign and Verify without Infringing the RSA Patent?
- Juneja Mamta, Sandhu Parvinder S. International Conference on Advances in Recent Technologies in Communication and Computing, Pages No. 302 – 305, 27-28 Oct. , 2009. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption.
- Paar Christof, Pelzl Jan. ISBN 978-3-642-04100-6, Springer, 2010. Understanding Cryptography.
- Furht Borko, Kirovski Darko. ISBN: 0-8493-7212-7, 2006. Multimedia Encryption and Authentication Techniques and Applications.
- Katz Jonathan, Lindell Yehuda. ISBN: 978-1-58488-551-1, 2008. Introduction to Modern Cryptography: Principles and Protocols.
- Hoffstein Jeffrey, Pipher Jill, Silverman Joseph H. ISBN: 978-0-387-77993-5, 2008. An Introduction to Mathematical Cryptography.