Submit Search
Upload
IRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
•
0 likes
•
12 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i9/IRJET-V6I9280.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 9
Download now
Download to read offline
Recommended
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET Journal
Â
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
iosrjce
Â
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
Â
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
Â
Bq4301381388
Bq4301381388
IJERA Editor
Â
Stegonoraphy
Stegonoraphy
Junus Sinuraya
Â
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
IJECEIAES
Â
Notacd02
Notacd02
Azmiah Mahmud
Â
Recommended
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET Journal
Â
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
iosrjce
Â
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
Â
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
Â
Bq4301381388
Bq4301381388
IJERA Editor
Â
Stegonoraphy
Stegonoraphy
Junus Sinuraya
Â
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
IJECEIAES
Â
Notacd02
Notacd02
Azmiah Mahmud
Â
Computer Networks Basics
Computer Networks Basics
ijtsrd
Â
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
Journal For Research
Â
Learning assignment (computer Networking)
Learning assignment (computer Networking)
Mehar Arslan
Â
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
IJTRET-International Journal of Trendy Research in Engineering and Technology
Â
H43064650
H43064650
IJERA Editor
Â
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
saurabh goel
Â
Computer Network ASsignment
Computer Network ASsignment
Bijay Bista
Â
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
IJNSA Journal
Â
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
Â
Notacd05
Notacd05
Azmiah Mahmud
Â
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
csandit
Â
Hl3312951297
Hl3312951297
IJERA Editor
Â
Module1 introduction to network
Module1 introduction to network
Miz Malinz
Â
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
Â
Network Notes
Network Notes
BOXLIGHT Inc
Â
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...
csandit
Â
niceData com.
niceData com.
janiceramirez07
Â
G04734450
G04734450
IOSR-JEN
Â
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
Â
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
Â
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
IJECEIAES
Â
Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish Cipher
BRNSSPublicationHubI
Â
More Related Content
What's hot
Computer Networks Basics
Computer Networks Basics
ijtsrd
Â
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
Journal For Research
Â
Learning assignment (computer Networking)
Learning assignment (computer Networking)
Mehar Arslan
Â
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
IJTRET-International Journal of Trendy Research in Engineering and Technology
Â
H43064650
H43064650
IJERA Editor
Â
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
saurabh goel
Â
Computer Network ASsignment
Computer Network ASsignment
Bijay Bista
Â
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
IJNSA Journal
Â
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
Â
Notacd05
Notacd05
Azmiah Mahmud
Â
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
csandit
Â
Hl3312951297
Hl3312951297
IJERA Editor
Â
Module1 introduction to network
Module1 introduction to network
Miz Malinz
Â
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET Journal
Â
Network Notes
Network Notes
BOXLIGHT Inc
Â
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...
csandit
Â
niceData com.
niceData com.
janiceramirez07
Â
What's hot
(17)
Computer Networks Basics
Computer Networks Basics
Â
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
Â
Learning assignment (computer Networking)
Learning assignment (computer Networking)
Â
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
Â
H43064650
H43064650
Â
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
Â
Computer Network ASsignment
Computer Network ASsignment
Â
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Se...
Â
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Â
Notacd05
Notacd05
Â
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
Â
Hl3312951297
Hl3312951297
Â
Module1 introduction to network
Module1 introduction to network
Â
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
Â
Network Notes
Network Notes
Â
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Â
niceData com.
niceData com.
Â
Similar to IRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
G04734450
G04734450
IOSR-JEN
Â
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
Â
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
Â
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
IJECEIAES
Â
Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish Cipher
BRNSSPublicationHubI
Â
Securing voip communications in an open network
Securing voip communications in an open network
eSAT Publishing House
Â
Security And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
Samantha Randall
Â
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
Â
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
IJCSIS Research Publications
Â
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
IRJET Journal
Â
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
Â
Implement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
Â
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
Â
Unit 1 Introducation
Unit 1 Introducation
Tushar Rajput
Â
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET Journal
Â
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
Â
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET Journal
Â
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
IRJET Journal
Â
Voice Enable Blind Assistance System -Real time Object Detection
Voice Enable Blind Assistance System -Real time Object Detection
IRJET Journal
Â
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET Journal
Â
Similar to IRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
(20)
G04734450
G04734450
Â
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
Â
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
Â
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
Â
Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish Cipher
Â
Securing voip communications in an open network
Securing voip communications in an open network
Â
Security And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
Â
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
Â
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
Â
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
Â
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
Â
Implement a novel symmetric block
Implement a novel symmetric block
Â
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
Â
Unit 1 Introducation
Unit 1 Introducation
Â
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
Â
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
Â
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
Â
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
Â
Voice Enable Blind Assistance System -Real time Object Detection
Voice Enable Blind Assistance System -Real time Object Detection
Â
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
Â
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
Â
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
Â
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Â
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
Â
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
Â
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Â
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
Â
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Â
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Â
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Â
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
Â
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Â
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Â
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
Â
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Â
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Â
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
Â
React based fullstack edtech web application
React based fullstack edtech web application
Â
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
Â
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Â
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Â
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Â
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Â
Recently uploaded
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Â
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Â
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
JoĂŁo Esperancinha
Â
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
ROCENODodongVILLACER
Â
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Â
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Â
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Â
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Â
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Â
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Â
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Â
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Â
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
Â
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Â
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
Â
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Â
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Â
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Â
Recently uploaded
(20)
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Â
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Â
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Â
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Â
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
Â
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Â
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Â
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Â
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Â
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Â
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Â
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Â
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Â
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
Â
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Â
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
Â
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Â
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Â
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Â
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Â
IRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1803 ENHANCED IMAGE ENCRYPTION SYSTEM USING BLOWFISH AND RANDOMIZATION METHODS Vincent, Tamaramiebi D1, Njoku, Celestine N2, Zuokemefa, Enebraye P3 1Lecturer, Department of Computer Science, Isaac Jasper Boro College of Education, Sagbama, Nigeria 2Senior Lecturer, Department of Computer Science, Federal University of Technology, Owerri, Nigeria 3Lecturer, Department of Computer Science, Isaac Jasper Boro College of Education, Sagbama, Nigeria ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - This research work implements an enhanced image encryption system using blowfish and randomization methods. Images contain sensitive information in compact format and needs to reserve it confidentiality from unauthorized access. Increase in computational speed of modern device and image hacking has ringed the bell for creation and modification of existing image cryptography algorithm and techniques to meet current image security challenges. Hence this work applied image hybridization and separation techniques to provide first level protection for the plain image and blowfish method provided second level protection for the plain image. Thesystemwasimplementedin Microsoft Windows platform using java programming language, java media framework (JMF) and java image processing (JImage_) to secure jointphotographic group(.jpg) image format. The study used scientific/mathematical programming, experimental testing and data visualization methodology. Time complexity and memory size were used to evaluate the system performance. The results shows that’s encryption and decryption time depends on the image size, no pixel value was lost during encryption and decryption of images, the system requirelessencryptionanddecryptiontime and also less memory for execution. Thissystemcanbeapplied in Military weapon research and image communication, Agricultural crop research and disease control, Geographic information system, Biological research, patentededucational artworks. Key Words: Blowfish, Cryptography, Hybridization,Image, Inverse function, Randomization, Separation. 1. INTRODUCTION In this modern technological age, data and information have become key factor of human existence because various works of life are in dare need of data and information. Typically, data and information are stored in different electronic storage medias such as blue ray, smart card, flash drives (USB drives), memory cards, compact disks (CD), digital Video disks (DVD), hard disks, etc. Data and information stored in these various devices could be files, audio, images, text, animations, documents, etc. To ensure the availability of digital data and information to the world, these digital components need to be transmitted over short and long distances through the internet for various usages and applications. [1] Defines internet as an international network that interconnects computer networks using standard internet protocols such as internet Protocol Suite (TCP/IP) to transmit data and information across the globe to billions of internet users. The internet is a connection of local, metropolitan to global networks such as public, private, business, government,and academic networks that are joined together by wireless, optical fibres and electronic networking technologies. The use of internet growth geometrically whichcreatedthe need for internet users to deliberately generate techniques and methods to secure sensitive data and information to deny unfriendly users from getting unauthorized access. The accelerated use of internet by government,academic,health, science, engineering, agriculture, transport, business activities and applications requires a greater demand for quality data and informationservice.Basedontheincreasing use of the internet to meet the world’s day – to - day data and information activity needs, there exists the urgency to provide quality data and information service by ensuring standard protocol control measures. Hence data and information security is needful and important when transmitted over the internet. During data transmission, there are chances of these highly confidential, important data couldfall intowronghandssuch as hackers, which could lead to dangerous situationssuchas loss of data (bank information, pin numbers, passwords), shut down of emails, websites, servers, telecommunication system etc. However providing data and information security is a complex and broad scope of study. Image data has become one of the most frequently shared and stored data in the world at different end – to - end communication channels. An image data may contain highlyconfidential and valuable information. There are several types of image data presently in use this modern era. They are applicable in medical research, forensic, military, government sector, multimedia, film division, science research, engineering research, etc. In the cause of image data transmission, hackers do attempt to access the data illegally for malicious use. These illegal actions and troubles mostly occur in the transmission process over the internet [2]. To courageously safeguard and protect image data, cryptography algorithms can be applied. Today many data encryption algorithms exist such as: Data Encryption Standard (DES), Advanced Encryption Standard
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1804 (AES), International Data Encryption Algorithm (IDEA), Blowfish Algorithm, etc. This work focussed on Blowfish Algorithm. BlowfishAlgorithmisa symmetric (64-bits)block cipher algorithm that was used to supersede Data Encryption Standard (DES) [3]. This algorithm is very effective in securing data and information in this technological jet age. Its advantage liesonthe ranginglength of variable key from 32-bits to 448-bits with a default 128- bits, making it one of the best algorithms for securing data and information. 1.1 Blowfish Algorithm This is one of the symmetric encryption algorithms mostly used effectively for data security. It is available to all users because it is unpatented and license free. It key length ranging from 32bits – to – 448bits makingitoneofmostvital and efficient cryptography algorithms. 1993 Bruce Schneier developed Blowfish algorithm free, faster encryption algorithm alternative to existing algorithms such as DES, 3DES, AES, etc. [4]. Both encryption and decryption uses same secret key and plaintext is divided into fixed block length during these processes. [5] Identified that blowfish algorithm is divided into two parts: data encryption and key expansion. Data encryption applies Feistel Network which simply performs specified iterative roundsoftheencryption function while key expansion part divided at most 448bits key length into sub-keys totalling 4168bytes. The 64-bits block length is padded into multiples of eight bytes in size [6]. Presented in figure-1 is the structure of blowfish algorithm. Blowfish keeps twosub-keyarrays:Eighteen(18) P-array (32-bits each) boxes and four (4) S-boxes (32-bits each, resulting to 256 entries). After string initialization, the first 32bits of the key are exclusively XORed with the first 32bits P-array (P1). This process continues until the specified round iteration is completed by the algorithm. After the last round of iteration, the left (L) and right (R) are swapped and left (L) is XORed as the 17th index of the P-box and finally the right is XORed as the 18th index of the p-box. This new 64-bit output becomes the cipher data. The decryption process is simply performing a reverse order of the encryption process. Figure–1: Structure of Blowfish Algorithm [7] 1.2 Feistel Network in Blowfish algorithm This is a design model from which many different block ciphers are derived. Horst Feistel designed the feistel network model used in several block cipher algorithms (4). Figure-2 represents the use of feistel network model in blowfish encryption algorithm. The iterative roundsdepend on the system developer desired number to encrypt plaintext. The iterative rounds consist of substitution and permutation operations. The following are the working steps of a Feistel Network: 1. Input block divided into two halves (Right (R) and Left(L)) 2. Right half swapped to become new left half. 3. New left half and function F is exclusively ORed (XORed) to give new right half. 4. Note previous rounds can be derived even without function F. Figure –2: Feistel Network [8] The function f in Feistel Network is discussed by figure-3. Let the 32-bits input is shared into four segments of 8-bits each as shown by the diagram below. The function f is generally expressed as: f (K, R) = ((sBox1[a]+ sBox2[b]) ^ sBox3[c]) + sBox4[d]) Where sBox1, sBox2, sBox3 and sBox4 are the four S-Boxes and a, b, c, d represents the 32-bits input to the function F, separated into four consecutive discrete segments of 8-bits each, starting from the most significant bit (MSB). Figure 2.15 shows how function F obtains sub-keys for the Feistel Network. Using the equation 2.3: A modulo addition is done on sBox1[a] and sBox2[b], the result XORed with sBox3[c]. The XORed result and sBox4[d] are added together to obtain a sub-key.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1805 Figure-3: Function f in Feistel Network [7] 1.3 Generating Blowfish Algorithm Sub-keys [5] Noted that the encryption and decryption are same in blowfish except that during decryption the keys are used in reverse order. They highlighted the following identical steps of blowfish algorithm: 1. Initialization of P-array and four S-boxes with fixed string input. 2. Repeated XOR operation is performedfromthefirst P1 (32-bits) until a possible P14, the cycle is repeated with the key bits. 3. Blowfish algorithm usesSub-keysdescribed byStep 1 and 2 to encrypt all zero-string. 4. The result of step 3 is used replace P1 and P2. 5. The result of step (3) is encrypted using the blowfish algorithm withthe newmodifiedsub-keys. 6. Replace the result of P3 and P4 with theresultof(5) The process continuously replaces P-arrays and S-boxes until all entries are complete, implying that the result also changes continuously.Forexampleiftheiterative roundsare sixteen (16). A total of 521 iterations required to generate blowfish algorithm sub-keys. 2. RELATED WORKS In this modern era, multimedia applicationsarefastgrowing in geometric progression and digital data security has become vital issue in image transmission and imagestorage. Cryptography is one of the several mechanisms to security digital images [9]. Image cryptography transform a plain image into cipher image that is difficult to identify and decipher, ensuring their confidentiality between users. Several image applications require special and reliable systems to protect digital images. At present different methods or techniques can be used to obtain image encryption. Image encryption can be achieved with traditional encryption methods (AES, DES, Blowfish, RSA, etc.), non-traditional methods (chaotic and quantum theories) and encryption content (direct and selective encryption). Direct encryption (pixel by pixel) adopts a simple method of changing the original pixel value of the image while selective encryption approach preform bit streaming that is parsed in order to identify the parts subjected to encryption [10]. [10] Highlighted a detailed analysis of open source computer vision (open CV) methods to explore image data structure. It utilise a defined pointer to traverse image data (making various operations done on theimagepossible)and integrating it with 2dimensional Arnold transformation technique to encrypt image. To obtain decryption inverse operation is done Arnold transformation. Open CV library functions ensure simple and feasible encryptionprocessand lays the foundation for operational update. Arnold transformation is a simple image encryption method but when larger and increased pixel data is used the process become very slow. [3] Employed blowfish algorithm to encrypt and decrypt both coloured and black and white images of any size saved in the format of TIF, bmp, PNG, JPG, JPEG, etc. and implemented in MATLAB. Although the histogram used in illustrating the encrypted image was less dynamic, it was significantly different to the respective histograms of the original image. The study showed that an attacker must try 28r + 1 possible combinations (r denote iterative rounds) to break a blowfish algorithm. The amount of iterative rounds determines the strength of blowfish algorithm. No blowfish security system is yet to record any known weak point, hence it can be consider as one of the existing excellent standard algorithm for image encryption [3]. [9] Applied two techniques called spatial domain and wavelet domain techniques in their attempt to provide image security. The spatial domain technique performs spatial domain operation on image to use a cover image to hide the desire secret image. The wavelet domain technique hides the secret image in the decomposed cover image data. The decomposed image data bits can be retrieved by using other bits to hide the secret image. A two-stage encryption algorithm was used to finalise the encryption process. The first stage decomposed the secret image into two shared images and the second stage embedded the shared image into the cover image. It was observed that the method proposed and applied by [9] improved the security of secret images. Furthermore, [11] employed a new technique called watermarking (digital image watermarking) technique. The proposed method encrypts and embeds a watermark into another watermark and these combined watermarks are enclosed into the main image. The act of embedding one watermark into another is known as Nested watermarking. By applying nested watermark it increases the securitylevel of the main image due to the use of encryption and decryption techniques, which also enhances the embedding capacity of the watermark. The proposed technique used blowfish encryption and decryption algorithm which is a suitable and efficient technique for hardware implementation. This proposed technique has the following
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1806 advantages: (1) the concept of nesting increases embedding capacity of watermark into the main image, (2) that before the embedding watermarks into the main image an Encryption of watermarks is done to provide a better security, and (3) Blowfish encryption helps to make the method robust [11]. A recent work done by [12] in their paper “ImageEncryption Technique using Blowfish Algorithm” used a chaos-based technique and blowfish algorithm cryptography to provide an image security system that reduces time taken to encrypt/decrypt, increase efficiency and reliable ways of dealing with bulky, difficult and unruly images.Theresearch recommends thatmultimedia imagesshouldbesecured with applied techniques. The reason being that images are arranged in blocks when viewed. Every intelligible image is formed by correlating its elements in a given arrangement. They also applied chaotic technique to divide the image into random blocks which are nowshuffledwithintheimage. The new transformed image is fed as input to blowfish encryption. The seeds are determined by a secretkey playsa key role in building the transformation table and then generate the transformedimagewithdifferentrandomblock sizes. Hence, the transformation process is act of dividing and replaces of image arrangement process. The image is divided into blocks, each contain specific number of pixels. The transformed blocks are placed into new locations. At decryption level, the blocks are reversed using inverse transformation to retrieve the original image. Theaimofthis technique was to enhance the image security level by reducing image elements correlationandincreaseamountof information value. 3. ANALYSIS OF EXISTING SYSTEM [3] Used MATLAB to implement an image security system using blowfish encryption algorithm. The architectureof the existing system is presented in figure 3.1. It is designed to encrypt 64-bit block plaintext into same cipher textsecurely and efficiently. The algorithm operations selects from addition, bitwise logic gate (exclusive-OR) and lookup table to reduce data encryption and decryption time. The algorithm developers consciously maintain simplicity of operations and coding without compromising the system. The researchers blended16Feistel Network iterativerounds for encryption and decryption. Each iterativeroundinvolves left and right 32-bits data modified. Bitwise exclusive-OR gate is implemented on theleft32-bitsbeforebeing modified by blowfish function (f) or passed to the right 32-bits for the next Feistel Network iteration round. Swapping operation is done immediately after the 16 iteration round and two bitwise exclusive-OR is performed to produce the cipher text. This actually differentfrompermutationfunctionsdone by other cryptography algorithms. Figure-4: Architecture of the existing Blowfish Encryption system [3] 3.1 Analysis of the Proposed System This research proposes an image cryptographic system that takes blowfish algorithm(presentedinfigure-1) as an open-ended design and incorporate randomized hybridization to produce a moresecuredJPGimagepixel-by- pixel cipher blending of the original andrandomlygenerated image to produce inputs to the blowfish algorithm. The output is a cipher image that can be stored, transmitted and decrypted by authorized receiver. The decryption processis to follow the reverse order of blowfish algorithm. The functionalities of the proposed system are specified in phases as follows: Phase 1: Input Image Generation 1. Generate a random image (.jpg) 2. Get the original image (.jpg) to be encrypted 3. Hybridize original andrandomlygenerated images to form one image (input image) Phase 2: Image Encryption 1. 16 rounds of Feistel Network iterations 2. Applying Blowfish Algorithm on the input image 3. Generate Encrypted Image (Cipher Image) and store it. Phase 3: Image Decryption 1. Input Cipher Image 2. Applying inverse of Blowfish Algorithm to decrypt cipher image. 3. Generate decrypted Image (.jpg) to produce the hybridized image.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1807 Phase 4: Generate Original Image 1. Get the decrypted image (i.e. the hybridized image). 2. Get the random image 3. Separate the random image from decrypted image to generate original image. For system to perform hybridization and separation is important to consider invertible functions. Figure-5: Architecture of the Proposed System Model 3.2 Invertible Functions and Applications to Image Encryption An inverse function is a function that will undoanythingthat the original function does. If f(x) represents a function, then the notation f - 1 (x), read f is an inverse of x, will be used to denote the inverse of f(x)[13]. Inverse function can be defined mathematically below: Let P, Q be sets, and let f: P→Q. An inverse function for f is a function g: Q→P such that f (g(b)) = b for all b ϵ Q and g(f(a)) = a for all a ϵ P Note not all function are invertible function hence is vital to determine if a function is invertible. To determine if a function has an inverse function property is necessary to consider Injective (one-to-one) functions. One-to-one function is a function type that where each input value (x) has a peculiar output (y). Injective functions is a function f from set P to set Q is a function such that each a in P is related to a different b in Q. formally f :P →Q Injective (one - to - one) function f(a) = f(b) implies a = b, or f :P →Q a ≠b implies f(a1) ≠f(b). The sketch below illustrates one-to-one mapping of an invertible function. Figure-6: Inverse Function Mapping [13] Example of an invertible function: The function f (x) = x + 2 from the set P = {3, 4, 5, 6} to the set Q = {5, 6, 7, 8} can be written as follows. f (x) = x + 2: {(3, 5), (4, 6), (5, 7), (6, 8)} the invertible function f –1 is a function from the set Q to the set P, and can be written as follows. f –1(x) = x – 2: {(5, 3), (6, 4), (7, 5), (8, 6)} The sketch below shows the mapping relationship between function f(x) and invertible function f –1(x) Figure-7: Inverse Function Mapping of f(x) and f –1(x) Applying inverse function to the proposed system We let P = Original image and Q = Random Image Were P and Q contain picture elements or word pixels (red, green, blue) each element being represented with integer values. Suppose f(P, Q, Z) → Z= P + Q
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1808 P = Q = Let f(P, Q) be a matrix function such that Z = f(P, Q) is the image hybridization technique where by pixel-by-pixel addition produces a new image. Thus, with the given values of P and Q. Z = Suppose pij = [0,1,2,…,255], qij = [0,1,2,…,255] and zij = [0,1,2,…,255] For image hybridization technique Where zij = pij + qij if (zij > 255) then zij = zij - 255 Figure-8: System Input Image Hybridization The inverse function f(P, Q, Z) is denoted by f –1(Q, Z, P)which is a mapping from the matrices Z and Q to matrix P. This can be expressed as f –1(Q, Z, P) → P = Z-Q Here the inverse function is a form of image separation technique P = For image separation technique Where pij = zij - qij if (pij < 0) then pij = pij + 255 Figure-9: System Output Image Separation 4. ANALYSIS OF RESULTS The results of the new model were analyzed and compared using performance measurement factors: i. Time complexity Tables and charts below illustrate time (speed) complexity performance measure in terms of seconds. Images presented are results of encryption and decryption process of the system with relation to time taken for execution. Table -1: Comparing encryption and decryption time of system test images. S / N File name Image Size (kb) Encrypti on Time (s) Decrypti on Time(s) 1 SampleTestImag e1.jpg 31.80 0.56 0.59 2 SampleTestImag e2.jpg 28.50 0.52 0.50 3 SampleTestImag e3.jpg 21.90 0.44 0.41 4 SampleTestImag e4.jpg 16.90 0.34 0.32 5 SampleTestImag e5.jpg 20.00 0.37 0.35
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1809 The chart below compares time taken to encryption and decryption system test images. Chart-1: Comparing encryption and decryption time system test images The test images are hybrided withsystemgeneratedrandom images to produce system input images “HybridImage” as shown in figure-8 above. Table -2: Comparing enhanced and unenhanced encryption time of system input images (HybridImage). S / N File name Image Size (kb) Enhanc ed (s) Unenhan ced(s) 1 HybridImage1. jpg 109.00 1.05 1.36 2 HybridImage2. jpg 105.00 0.65 1.27 3 HybridImage3. jpg 88.10 0.63 1.05 4 HybridImage4. jpg 86.40 0.59 1.02 5 HybridImage5. jpg 86.20 0.54 0.57 The chert below compares time taken to encryption system input images by the enhanced system and unhancedsystem. Chart-2: Comparing encryption time difference of input image between enhanced and unenhanced system Table -3: Comparing enhanced and unenhanced decryption time of system input images. S / N File name Image Size (kb) Enhanc ed (s) Unenhan ced(s) 1 HybridImage1. jpg 109.00 1.02 1.23 2 HybridImage2. jpg 105.00 0.68 1.18 3 HybridImage3. jpg 88.10 0.61 1.03 4 HybridImage4. jpg 86.40 0.56 0.68 5 HybridImage5. jpg 86.20 0.51 0.65 The chert below compares time taken to decryption system input images by the enhanced system and unhancedsystem. Chart-3: Comparing decryption time difference of input image between enhanced and unenhanced system. The chart shows that images with smaller memory size require minimal time for encryptionanddecryption.Chart-1 shows that the enhanced system takes lessertimetodecrypt than to encrypt. Chart-2 and chart-3 give a clear picture that the enhanced system takes lesser to encrypt and decryption when compared to unenhanced system. ii. Memory (Space) The size of image files is measured before and after encryption to observe the memory consumption. Table4 and table5 shows the different image file sizes of both the encryption and decryption processes of the system in bytes. Table -4: Comparing Input image system after encryption and decryption.
8.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1810 S / N File name Image Size (kb) Encrypt ion (kb) Decrypti on(kb) 1 HybridImage1. jpg 109.00 138 138 2 HybridImage2. jpg 105.00 122 122 3 HybridImage3. jpg 88.10 156 156 4 HybridImage4. jpg 86.40 141 141 5 HybridImage5. jpg 86.20 147 147 Encrypted and decrypted image are equal. Which implies that no pixel value of the images where lost. However the random image most be separated from the decrypted image to get the plain imaged used in the hybridization technique. Table -5: Comparing separated image with system test image sizes after decryption. S / N File name Image Size (kb) Test Image (kb) Separate d Image (kb) 1 DecryptedIma ge1.jpg 138 31.80 31.80 2 DecryptedIma ge2.jpg 122 28.50 28.50 3 DecryptedIma ge3.jpg 156 21.90 21.90 4 DecryptedIma ge4.jpg 141 16.90 16.90 5 DecryptedIma ge5.jpg 147 20.00 20.00 5. CONCLUSION This researchwork enhancedimageencryptionsystemusing blowfish and randomization methods provided a double protection of the plain image, reduces encryption and decryption time, require minimal memory to execute and prevent pixel value loss during encryption and decryption. 5.1 Recommendations We recommend the following: 1. Image encryption system using blowfish encryption algorithm should be implemented in hardware. 2. Image encryption system with blowfish algorithm, JMF and JImage_ should be implemented on other image formats (gif, png, tiff, etc.). 3. The number of iteration in blowfish encryption algorithm should be increased to 20 and above. References [1] M. Anand and S. Karthikeyan, “Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms”, I.J. Computer Network and Information Security, Mar. 2012,2,22-28, doi:10.5815/ijcnis.2012.02.04, http://www.mecs-press.org [2] J Abdul and M. Jisha, “Guarding Images using a Symmetric key Cryptographic Technique: Blowfish Algorithm”, IJEIT vol.3, Issue 2, Aug. 2013, ISSN: 2277- 3754 [3] S. Pia and S. Karamjeet, “Image Encryption and Decryption using Blowfish Algorithm in Matlab”, IJSER vol. 4, Issue 7, Jul. 2013, ISSN 2229-5518, http://www.ijser.org [4] M. Saikumar and K. Vasanth, “Blowfish Encryption Algorithm for Information Security”, Journal of Engineering and Applied Science, ARPN vol.10, No.10, 2015, www.arpnjournals.com [5] H. Chaitali and K. Sonia, “Implementation of AES and Blowfish Algorithm”,IJRET, vol.3,Issue3,NCRIET-2014, http://www.ijret.org [6] N. Valmik and V. Krshirsagar, “Blowfishalgorithm”,IOSR Journal of Computer Engineering, vol. 16, Issue2,pp 80- 83, Mar-Apri. 2014, e-ISSN: 2278-8727, www.iosrjounals.org [7] L. Christina and I. Joe, “Optimized Blowfish Encryption Technique”, International Innovative Research in Computer and Communication Engineering,vol.2,Issue 7, 2014, ISO: 3297:2007, www.ijircce.com [8] W. Edward and T. Achileas, “Blowfish”, http://www.ed- wolf.com/wordpress/wp- content/upoads/2011/10/Blowfish_Report.pdf [9] T. Sudha and B. Gopi, “Novel Spatial and Transform Domain Image Encryption Algorithms”, IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) vol. 4, Issue 2, ver. II, 2014, www.iosrjournals.org [10] P. Ashish, A. Arjun, et al, “Sophisticated Image Encryption using OpenCV”, International Journal of advanced Research in Computer Science and Software Engineering, vol.2, Issue1, 2012, www.ijarcsse.com
9.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1811 [11] G. Preeti and M. Neeraj, “A Survey on Image Encryption and Decryption using Blowfish & Watermarking”, 3285 IJRITCC vol. 3, Issue 5, 2015, http://www.ijritcc.org [12] B. Kalidas, S. Yashodha, et al, “Image Encryption Technique using Blowfish Algorithm”, IJAFRSE vol. 1, Special Issue, impact factor: 1.036, Science Central value: 26.54, 2015. [13] C. Sid, “Functions and Inverses”, CS 2800: Discrete Structures, Spring, 2015
Download now