SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. IV (Nov – Dec. 2015), PP 08-11
www.iosrjournals.org
DOI: 10.9790/0661-17640811 www.iosrjournals.org 8 | Page
A Cryptographic Key Generation on a 2D Graphics using RGB
pixel Shuffling and Transposition
1
Swapnali Krushnarao Londhe., 2
Megha Dilip Jagtap.,
3
Ranjeet Ravindra Shinde., 4
P.P. Belsare
1
Student of Dept. of Computer Engg., Engg., S.B.P.C.O.E.Indapur,SPPU Pune, India.
2
Student of Dept. of Computer S.B.P.C.O.E.Indapur, Pune, India.
3
Asst.Prof. of Dept.of Computer S.B.P.C.O.E.Indapur, Pune, India.
Abstract: Now a day with incredible change in social media network such as mobile communication and
computer, all type of a data such as audio, video, images are used for the communication .Privacy for that data
is an important issue .Cryptography is one of the technique used for stopping unauthorized access and
increasing integrity of that data. In this research encryption and decryption scheme is used based on image
pixel shuffling and transposition. We can use cipher algorithm for generating key using RGB values of the pixel.
For that purpose we use m*n size image on which different operations are performed. This algorithm was
implemented in java language.
Keywords: Cryptography, Encryption, Decryption, Cipher text, Pixel, 2D graphics image, Integrity, key
I. Introduction
We cannot think about the world without communication .Now a day’s hiding of data from
unauthorized person is an important task .There is many online services present in which communication take
place through social media network. In that case there is high probability of hacking [1].
Integrity of a data is not maintained well. Different techniques are used to maintain a security in all
social networks communication. These techniques such as cryptography and stenography .
Cryptography is the best technique to increase the security between communications. It’s applied on a
different type of data such as text, image, video etc. In cryptography two different processes are there, first is
encryption in which specific key is used to encrypt the data. It is a process of converting plain text in to cipher
text and second is decryption in which cipher text is converting into plain text. Two things are important for
performing encryption and decryption, first is algorithm and second is key. Plain text is combined with the
algorithm to form a key[1]. This generated key is then used for the encryption process .This cipher text is
applied to the algorithm for generating the plain text. Symmetric and asymmetric are the two approaches of
encryption .In symmetric same cryptographic key is used for encryption and decryption but in decryption
different key’s are used for processing. In this approach keys are identical or combination of different keys.
Image is made up of different color pixel s its nothing but the array of pixel having rectangular shape. Every
pixel having different colors at a single point, so pixel is a single color dot. Digital approximation can be
resulted from that color dot using this values reconstruction of that image take place.
Digital image having two types first is color image made up of color pixels. Color pixel holds primary
colors such as red, blue and green. This values proportion used for creating secondary colors. If each primary
contain the 256 levels then four byte memory required for each. Bi-level image having single bit to represent
each pixel . It’s having only two states with color black and white [2].
In this paper we focused on key part. In image based cryptographic technique, cipher algorithm of m*n
size image used for fetching RGB pixel values. Encryption and decryption of an m*n size image is based on the
RGB pixel values. Property of 2D graphics image is only viewing and listing image dimensions is sometimes
impossible for generating the image.
Paper having following structure, II section is related to related work. III section gives information
related to proposed system, IV section represent the advantages, V section proposes experimental work with
some mathematical part.VI provides the overall summary of our paper its concludes the paper.
II. Related work
Xiukun Li, Xianggian Wu*, Ning Qi, Kuanguan Wang has proposed a Novel Cryptographic algorithm
containing Iris features nothing but the iris textural features. Its algorithm having Add/minus operational and
read -Solomon error correcting. He defines the Region of Interest which used to differentiate different images
[3]. Using another technique for a novel cryptographic some extension is given by a shujiang Xu.yinglong
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition
DOI: 10.9790/0661-17640811 www.iosrjournals.org 9 | Page
Wang, Yucui Geo &Cong Wang. He uses a nonlinear chaotic map and means of XOR operations to encrypt a
novel image. In which two rounds are proposed for encryptions [4].
Krishan ,G.S and Loganathan proposed a new scheme based on a visual cryptography in which binary
images is used as the key input .The secret communicated images than decomposed into three monochromatic
images based on YCbCr color space & this monochromatic images converted into binary images were
encrypted using key called share -1[5].This technique is extended by christy and seenivasgam. He uses Back
Propagation Network (BPN) to produce the two shares. Using this technique images has been produced having
same features like original [6].
B. santhi, K.S.Ravichandran, A.P. Arun & L. Chakkarapani explains using images Features. Its uses
Gray Level co-occurrence matrix of an image to extract the properties of an image [7] . Kester, QA proposed a
cryptographic algorithm, which is based on a matrix and shared secrete key. He extends his research and use
RGB Pixel to encrypt & decrypt the images [8].
Ruisong Ye and Wei Zhou proposed a chaos based scheme for image encryption .In which chaotic
orbits is constructed by using a 3d skew tent map with three control parameters. This generation is used to
scramble the pixel positions .This approach having same good qualities such as sensitivity to initial control
parameters pseudo-randomness [9]. Extension to this approach for increasing the security purpose, Asia Mahdi
Naser alzubaidi propose a encryption technique using pixel shuffling with Henon chaotic. He divides scrambled
image into sixty four blocks rotate each one in clockwise direction with go angle. For making distortion, two
dimension Arnold Cat Mapping is applied and original position of pixel is reordered back to its original position
[10].
Amnesh Goel and Nidhi proposed a contrastive method. This method uses RGB values of pixels for
rearranging the pixel within image than encryption take place [11].
Panchami V , Varghese Paul , Amithab Wahi proposed a techniques in which massage encoded using
Unicode and encrypted using the RGB color .Hexadecimal values present for cipher color its distributes into two
equal parts and 1st
parts act as a message and 2nd
is a key[12].
III. Proposed work
In previous existing system key generation is take place using the pixel values of the 2D graphics
image. In which proposed algorithm used for extracting the pixel values as well as creating the key from
pixel[1]. For increasing the security of image during the communication and transmission we propose new
techniques. In last module we use RSA algorithm for encryption and same key is used for decryption process of
2D graphics image[2].
In this paper user having freedom to generate any type of pattern signature etc. having fixed size of
design pattern .Any image is made up of using different colors pixels. Each pixel having three components ass
RGB . This RGB values first of all extracted and after shuffling we get cipher image. It’s done only by using a
RGB values.
In this method we not use the bit values of pixel as well as pixel expansion at the end of the encryption
and decryption process. Pixel having numeric values which interchanged or the RGB values displaced from
their original position to create a cipher text. When we add all values in between image no change take place in
original size and shape in image. All the features of an image remain unchanged during the process of
encryption and decryption [2].
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition
DOI: 10.9790/0661-17640811 www.iosrjournals.org 10 | Page
Figure 1:- Encryption and decryption of image
Figure.1 describes the architecture of encryption and decryption. We provides user interface for
designing the pattern .According to cipher algorithm we fetch the all RGB values and manipulation take place
using reshuffling ,transposition techniques for generating key. Image decomposed into three components which
act upon the cipher algorithm. That components form the all features and characteristics of original image.
Within image boundaries all the RGB values are shuffled and interchanged, created array is different for all
components.
Figure 2: The flow chart diagram for the encryption and decryption process.
Figure.2 describes the flow of encryption and decryption process. In which first of all we accept the
image, fetch all the RGB components using cipher algorithm and convert plain text in to cipher text. We use
RSA algorithm for the encryption process. In which key is combined with cipher text for performing encryption
process. Decryption process take place by importing all data and using reveres process of encryption. This
process is done for generating original image with its shape and size.
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition
DOI: 10.9790/0661-17640811 www.iosrjournals.org 11 | Page
IV. Advantages
In terms of security analysis transposition and reshuffling of the RGB values of 2D graphics is really
effective. Security of image against all the attacks is increased due to extra swapping of component. Using RGB
values we extract all the exact features of the image and it’s quite easy to generate exact shape and size of the
original image.
V. Experimental work
We can extract all pixel values only when image is given as an input. We can apply cipher algorithm
having following steps.
Step -2. Start
Step -2. Import data and form image by interpreting each element.
Step -3. Extract all r, g, b component from image.
Step -4. Reshape all r, g, b component in to one dimensional array for each.
Step -5. Let, t= [y; 1; p] which is a column matrix.
Step -6. Transpose ‘t’ .
Step -7. Reshape ‘t’ into one dimensional array.
Step -8. Let, n= Total number of array.
Step -9. Let, r= (1st
part of n): (1/3rd
part of n) as one dimensional array.
Step -10. Let, b= (1/3rd
part of n): (2/3rd
part of n) as one dimensional array.
Step -11. Let, g= (2/3rd
part of n): (nth) as one dimensional array.
Step -12. Transform its with its original dimensions.
Step -13. Finally all data will convert into an image.
For decrypt the image from cipher text to plain text inverse of algorithm is used.
VI. Conclusion
This paper proposed a cryptographic key generation on a 2D graphics using RGB pixel shuffling &
transposition. In this paper any size images using as an input. Small change in image creates a number of keys.
In proposed cipher algorithm in each stage different keys are generated using the RGB pixel values on which
different operations are performed.
In future we can combines different RGB values of pixel in each other and generate a new pattern for
key generation.
References
[1]. Pratik Shrivastava, Retesh jain, K.S.Raghu Wanshi, A modified. Approach of key manipulation in cryptography using 2D graphics
Image,2014.
[2]. Quist Aphetsi Kester,MIEEE, Image Encryption based on the RGB PIXEL Transposition and Shuffling,2013.
[3]. Xiukum Li, Xianggian Wu* , Ning Qi, Kuanquan Wang.Anovel cryptographic Algorithm based on iris feature ,2008.
[4]. Shujiang Xu,Yinglong Wang,Yucui Guo,Cong Wang, "A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map",
IJIGSP, vol.2, no.1, pp.61-68, 2010.
[5]. Krishnan, G.S.; Loganathan, D.; , "Color image cryptography scheme based on visual cryptography," Signal Processing,
Communication, Computing and Networking Technologies (ICSCCN), 2011 International Conference on , vol., no., pp.404-407,
21-22 July 2011
[6]. Christy, J.I.; Seenivasagam, V.; , "Construction of color Extended Visual Cryptographic scheme using Back Propagation Network
for color images," Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on , vol., no.,
pp.1101-1108, 21-22 March 2011.
[7]. B. Santhi, K.S. Ravichandran, A.P. Arun and L. Chakkarapani Novel Cryptographic Key Generation Method Using Image
Features,2012.
[8]. Kester, Quist-Aphetsi; , "A public-key exchange cryptographic technique using matrix," Adaptive Science & Technology (ICAST),
2012 IEEE 4th International Conference on , vol., no., pp.78-81, 25-27 Oct. 2012
[9]. Ruisong Ye,Wei Zhou,"A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice", IJCNIS,
vol.4, no.1, pp.38-44, 2012
[10]. Asia mahdi Naser Alzubaid,. Color Image Encryption & decryption using pixel shuffling with Henon chaotic syste,2014.
[11]. Amnesh Goel,Nidhi Chandra,"A Technique for Image Encryption with
[12]. Combination of Pixel Rearrangement Scheme Based On Sorting Group Wise Of RGB Values and Explosive Inter-Pixel
Displacement",IJIGSP, vol.4, no.2, pp.16-22, 2012.
[13]. Panchami V, Varghes Amithab Wahi, A New Color ORIENTED Cryptographic Algorithm Based on Unicode And RGB Color
Model,2014

More Related Content

What's hot

Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniqueseSAT Publishing House
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
Sign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute PeopleSign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute Peoplepaperpublications3
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyAM Publications
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab viewIJARIIT
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
Properties of Images in LSB Plane
Properties of Images in LSB PlaneProperties of Images in LSB Plane
Properties of Images in LSB PlaneIOSR Journals
 
Object Oriented Modeling of Space Efficient LSB based Steganography including...
Object Oriented Modeling of Space Efficient LSB based Steganography including...Object Oriented Modeling of Space Efficient LSB based Steganography including...
Object Oriented Modeling of Space Efficient LSB based Steganography including...IJCSIS Research Publications
 
Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

What's hot (18)

Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
Sign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute PeopleSign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute People
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Properties of Images in LSB Plane
Properties of Images in LSB PlaneProperties of Images in LSB Plane
Properties of Images in LSB Plane
 
Object Oriented Modeling of Space Efficient LSB based Steganography including...
Object Oriented Modeling of Space Efficient LSB based Steganography including...Object Oriented Modeling of Space Efficient LSB based Steganography including...
Object Oriented Modeling of Space Efficient LSB based Steganography including...
 
G0210032039
G0210032039G0210032039
G0210032039
 
A Fingerprint Pattern Approach to Hill Cipher Implementation
A Fingerprint Pattern Approach to Hill Cipher ImplementationA Fingerprint Pattern Approach to Hill Cipher Implementation
A Fingerprint Pattern Approach to Hill Cipher Implementation
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Viewers also liked

Viewers also liked (6)

IEEE-2016-2017-TITLES
IEEE-2016-2017-TITLESIEEE-2016-2017-TITLES
IEEE-2016-2017-TITLES
 
Java titles
Java titlesJava titles
Java titles
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Similar to A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition

Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionIRJET Journal
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesMangaiK4
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET Journal
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingIRJET Journal
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalIRJET Journal
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visualcsandit
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyinventionjournals
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
 

Similar to A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition (20)

Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing Images
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. IV (Nov – Dec. 2015), PP 08-11 www.iosrjournals.org DOI: 10.9790/0661-17640811 www.iosrjournals.org 8 | Page A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition 1 Swapnali Krushnarao Londhe., 2 Megha Dilip Jagtap., 3 Ranjeet Ravindra Shinde., 4 P.P. Belsare 1 Student of Dept. of Computer Engg., Engg., S.B.P.C.O.E.Indapur,SPPU Pune, India. 2 Student of Dept. of Computer S.B.P.C.O.E.Indapur, Pune, India. 3 Asst.Prof. of Dept.of Computer S.B.P.C.O.E.Indapur, Pune, India. Abstract: Now a day with incredible change in social media network such as mobile communication and computer, all type of a data such as audio, video, images are used for the communication .Privacy for that data is an important issue .Cryptography is one of the technique used for stopping unauthorized access and increasing integrity of that data. In this research encryption and decryption scheme is used based on image pixel shuffling and transposition. We can use cipher algorithm for generating key using RGB values of the pixel. For that purpose we use m*n size image on which different operations are performed. This algorithm was implemented in java language. Keywords: Cryptography, Encryption, Decryption, Cipher text, Pixel, 2D graphics image, Integrity, key I. Introduction We cannot think about the world without communication .Now a day’s hiding of data from unauthorized person is an important task .There is many online services present in which communication take place through social media network. In that case there is high probability of hacking [1]. Integrity of a data is not maintained well. Different techniques are used to maintain a security in all social networks communication. These techniques such as cryptography and stenography . Cryptography is the best technique to increase the security between communications. It’s applied on a different type of data such as text, image, video etc. In cryptography two different processes are there, first is encryption in which specific key is used to encrypt the data. It is a process of converting plain text in to cipher text and second is decryption in which cipher text is converting into plain text. Two things are important for performing encryption and decryption, first is algorithm and second is key. Plain text is combined with the algorithm to form a key[1]. This generated key is then used for the encryption process .This cipher text is applied to the algorithm for generating the plain text. Symmetric and asymmetric are the two approaches of encryption .In symmetric same cryptographic key is used for encryption and decryption but in decryption different key’s are used for processing. In this approach keys are identical or combination of different keys. Image is made up of different color pixel s its nothing but the array of pixel having rectangular shape. Every pixel having different colors at a single point, so pixel is a single color dot. Digital approximation can be resulted from that color dot using this values reconstruction of that image take place. Digital image having two types first is color image made up of color pixels. Color pixel holds primary colors such as red, blue and green. This values proportion used for creating secondary colors. If each primary contain the 256 levels then four byte memory required for each. Bi-level image having single bit to represent each pixel . It’s having only two states with color black and white [2]. In this paper we focused on key part. In image based cryptographic technique, cipher algorithm of m*n size image used for fetching RGB pixel values. Encryption and decryption of an m*n size image is based on the RGB pixel values. Property of 2D graphics image is only viewing and listing image dimensions is sometimes impossible for generating the image. Paper having following structure, II section is related to related work. III section gives information related to proposed system, IV section represent the advantages, V section proposes experimental work with some mathematical part.VI provides the overall summary of our paper its concludes the paper. II. Related work Xiukun Li, Xianggian Wu*, Ning Qi, Kuanguan Wang has proposed a Novel Cryptographic algorithm containing Iris features nothing but the iris textural features. Its algorithm having Add/minus operational and read -Solomon error correcting. He defines the Region of Interest which used to differentiate different images [3]. Using another technique for a novel cryptographic some extension is given by a shujiang Xu.yinglong
  • 2. A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition DOI: 10.9790/0661-17640811 www.iosrjournals.org 9 | Page Wang, Yucui Geo &Cong Wang. He uses a nonlinear chaotic map and means of XOR operations to encrypt a novel image. In which two rounds are proposed for encryptions [4]. Krishan ,G.S and Loganathan proposed a new scheme based on a visual cryptography in which binary images is used as the key input .The secret communicated images than decomposed into three monochromatic images based on YCbCr color space & this monochromatic images converted into binary images were encrypted using key called share -1[5].This technique is extended by christy and seenivasgam. He uses Back Propagation Network (BPN) to produce the two shares. Using this technique images has been produced having same features like original [6]. B. santhi, K.S.Ravichandran, A.P. Arun & L. Chakkarapani explains using images Features. Its uses Gray Level co-occurrence matrix of an image to extract the properties of an image [7] . Kester, QA proposed a cryptographic algorithm, which is based on a matrix and shared secrete key. He extends his research and use RGB Pixel to encrypt & decrypt the images [8]. Ruisong Ye and Wei Zhou proposed a chaos based scheme for image encryption .In which chaotic orbits is constructed by using a 3d skew tent map with three control parameters. This generation is used to scramble the pixel positions .This approach having same good qualities such as sensitivity to initial control parameters pseudo-randomness [9]. Extension to this approach for increasing the security purpose, Asia Mahdi Naser alzubaidi propose a encryption technique using pixel shuffling with Henon chaotic. He divides scrambled image into sixty four blocks rotate each one in clockwise direction with go angle. For making distortion, two dimension Arnold Cat Mapping is applied and original position of pixel is reordered back to its original position [10]. Amnesh Goel and Nidhi proposed a contrastive method. This method uses RGB values of pixels for rearranging the pixel within image than encryption take place [11]. Panchami V , Varghese Paul , Amithab Wahi proposed a techniques in which massage encoded using Unicode and encrypted using the RGB color .Hexadecimal values present for cipher color its distributes into two equal parts and 1st parts act as a message and 2nd is a key[12]. III. Proposed work In previous existing system key generation is take place using the pixel values of the 2D graphics image. In which proposed algorithm used for extracting the pixel values as well as creating the key from pixel[1]. For increasing the security of image during the communication and transmission we propose new techniques. In last module we use RSA algorithm for encryption and same key is used for decryption process of 2D graphics image[2]. In this paper user having freedom to generate any type of pattern signature etc. having fixed size of design pattern .Any image is made up of using different colors pixels. Each pixel having three components ass RGB . This RGB values first of all extracted and after shuffling we get cipher image. It’s done only by using a RGB values. In this method we not use the bit values of pixel as well as pixel expansion at the end of the encryption and decryption process. Pixel having numeric values which interchanged or the RGB values displaced from their original position to create a cipher text. When we add all values in between image no change take place in original size and shape in image. All the features of an image remain unchanged during the process of encryption and decryption [2].
  • 3. A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition DOI: 10.9790/0661-17640811 www.iosrjournals.org 10 | Page Figure 1:- Encryption and decryption of image Figure.1 describes the architecture of encryption and decryption. We provides user interface for designing the pattern .According to cipher algorithm we fetch the all RGB values and manipulation take place using reshuffling ,transposition techniques for generating key. Image decomposed into three components which act upon the cipher algorithm. That components form the all features and characteristics of original image. Within image boundaries all the RGB values are shuffled and interchanged, created array is different for all components. Figure 2: The flow chart diagram for the encryption and decryption process. Figure.2 describes the flow of encryption and decryption process. In which first of all we accept the image, fetch all the RGB components using cipher algorithm and convert plain text in to cipher text. We use RSA algorithm for the encryption process. In which key is combined with cipher text for performing encryption process. Decryption process take place by importing all data and using reveres process of encryption. This process is done for generating original image with its shape and size.
  • 4. A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition DOI: 10.9790/0661-17640811 www.iosrjournals.org 11 | Page IV. Advantages In terms of security analysis transposition and reshuffling of the RGB values of 2D graphics is really effective. Security of image against all the attacks is increased due to extra swapping of component. Using RGB values we extract all the exact features of the image and it’s quite easy to generate exact shape and size of the original image. V. Experimental work We can extract all pixel values only when image is given as an input. We can apply cipher algorithm having following steps. Step -2. Start Step -2. Import data and form image by interpreting each element. Step -3. Extract all r, g, b component from image. Step -4. Reshape all r, g, b component in to one dimensional array for each. Step -5. Let, t= [y; 1; p] which is a column matrix. Step -6. Transpose ‘t’ . Step -7. Reshape ‘t’ into one dimensional array. Step -8. Let, n= Total number of array. Step -9. Let, r= (1st part of n): (1/3rd part of n) as one dimensional array. Step -10. Let, b= (1/3rd part of n): (2/3rd part of n) as one dimensional array. Step -11. Let, g= (2/3rd part of n): (nth) as one dimensional array. Step -12. Transform its with its original dimensions. Step -13. Finally all data will convert into an image. For decrypt the image from cipher text to plain text inverse of algorithm is used. VI. Conclusion This paper proposed a cryptographic key generation on a 2D graphics using RGB pixel shuffling & transposition. In this paper any size images using as an input. Small change in image creates a number of keys. In proposed cipher algorithm in each stage different keys are generated using the RGB pixel values on which different operations are performed. In future we can combines different RGB values of pixel in each other and generate a new pattern for key generation. References [1]. Pratik Shrivastava, Retesh jain, K.S.Raghu Wanshi, A modified. Approach of key manipulation in cryptography using 2D graphics Image,2014. [2]. Quist Aphetsi Kester,MIEEE, Image Encryption based on the RGB PIXEL Transposition and Shuffling,2013. [3]. Xiukum Li, Xianggian Wu* , Ning Qi, Kuanquan Wang.Anovel cryptographic Algorithm based on iris feature ,2008. [4]. Shujiang Xu,Yinglong Wang,Yucui Guo,Cong Wang, "A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map", IJIGSP, vol.2, no.1, pp.61-68, 2010. [5]. Krishnan, G.S.; Loganathan, D.; , "Color image cryptography scheme based on visual cryptography," Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011 International Conference on , vol., no., pp.404-407, 21-22 July 2011 [6]. Christy, J.I.; Seenivasagam, V.; , "Construction of color Extended Visual Cryptographic scheme using Back Propagation Network for color images," Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on , vol., no., pp.1101-1108, 21-22 March 2011. [7]. B. Santhi, K.S. Ravichandran, A.P. Arun and L. Chakkarapani Novel Cryptographic Key Generation Method Using Image Features,2012. [8]. Kester, Quist-Aphetsi; , "A public-key exchange cryptographic technique using matrix," Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference on , vol., no., pp.78-81, 25-27 Oct. 2012 [9]. Ruisong Ye,Wei Zhou,"A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice", IJCNIS, vol.4, no.1, pp.38-44, 2012 [10]. Asia mahdi Naser Alzubaid,. Color Image Encryption & decryption using pixel shuffling with Henon chaotic syste,2014. [11]. Amnesh Goel,Nidhi Chandra,"A Technique for Image Encryption with [12]. Combination of Pixel Rearrangement Scheme Based On Sorting Group Wise Of RGB Values and Explosive Inter-Pixel Displacement",IJIGSP, vol.4, no.2, pp.16-22, 2012. [13]. Panchami V, Varghes Amithab Wahi, A New Color ORIENTED Cryptographic Algorithm Based on Unicode And RGB Color Model,2014