SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. IV (Nov – Dec. 2015), PP 08-11
www.iosrjournals.org
DOI: 10.9790/0661-17640811 www.iosrjournals.org 8 | Page
A Cryptographic Key Generation on a 2D Graphics using RGB
pixel Shuffling and Transposition
1
Swapnali Krushnarao Londhe., 2
Megha Dilip Jagtap.,
3
Ranjeet Ravindra Shinde., 4
P.P. Belsare
1
Student of Dept. of Computer Engg., Engg., S.B.P.C.O.E.Indapur,SPPU Pune, India.
2
Student of Dept. of Computer S.B.P.C.O.E.Indapur, Pune, India.
3
Asst.Prof. of Dept.of Computer S.B.P.C.O.E.Indapur, Pune, India.
Abstract: Now a day with incredible change in social media network such as mobile communication and
computer, all type of a data such as audio, video, images are used for the communication .Privacy for that data
is an important issue .Cryptography is one of the technique used for stopping unauthorized access and
increasing integrity of that data. In this research encryption and decryption scheme is used based on image
pixel shuffling and transposition. We can use cipher algorithm for generating key using RGB values of the pixel.
For that purpose we use m*n size image on which different operations are performed. This algorithm was
implemented in java language.
Keywords: Cryptography, Encryption, Decryption, Cipher text, Pixel, 2D graphics image, Integrity, key
I. Introduction
We cannot think about the world without communication .Now a day’s hiding of data from
unauthorized person is an important task .There is many online services present in which communication take
place through social media network. In that case there is high probability of hacking [1].
Integrity of a data is not maintained well. Different techniques are used to maintain a security in all
social networks communication. These techniques such as cryptography and stenography .
Cryptography is the best technique to increase the security between communications. It’s applied on a
different type of data such as text, image, video etc. In cryptography two different processes are there, first is
encryption in which specific key is used to encrypt the data. It is a process of converting plain text in to cipher
text and second is decryption in which cipher text is converting into plain text. Two things are important for
performing encryption and decryption, first is algorithm and second is key. Plain text is combined with the
algorithm to form a key[1]. This generated key is then used for the encryption process .This cipher text is
applied to the algorithm for generating the plain text. Symmetric and asymmetric are the two approaches of
encryption .In symmetric same cryptographic key is used for encryption and decryption but in decryption
different key’s are used for processing. In this approach keys are identical or combination of different keys.
Image is made up of different color pixel s its nothing but the array of pixel having rectangular shape. Every
pixel having different colors at a single point, so pixel is a single color dot. Digital approximation can be
resulted from that color dot using this values reconstruction of that image take place.
Digital image having two types first is color image made up of color pixels. Color pixel holds primary
colors such as red, blue and green. This values proportion used for creating secondary colors. If each primary
contain the 256 levels then four byte memory required for each. Bi-level image having single bit to represent
each pixel . It’s having only two states with color black and white [2].
In this paper we focused on key part. In image based cryptographic technique, cipher algorithm of m*n
size image used for fetching RGB pixel values. Encryption and decryption of an m*n size image is based on the
RGB pixel values. Property of 2D graphics image is only viewing and listing image dimensions is sometimes
impossible for generating the image.
Paper having following structure, II section is related to related work. III section gives information
related to proposed system, IV section represent the advantages, V section proposes experimental work with
some mathematical part.VI provides the overall summary of our paper its concludes the paper.
II. Related work
Xiukun Li, Xianggian Wu*, Ning Qi, Kuanguan Wang has proposed a Novel Cryptographic algorithm
containing Iris features nothing but the iris textural features. Its algorithm having Add/minus operational and
read -Solomon error correcting. He defines the Region of Interest which used to differentiate different images
[3]. Using another technique for a novel cryptographic some extension is given by a shujiang Xu.yinglong
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition
DOI: 10.9790/0661-17640811 www.iosrjournals.org 9 | Page
Wang, Yucui Geo &Cong Wang. He uses a nonlinear chaotic map and means of XOR operations to encrypt a
novel image. In which two rounds are proposed for encryptions [4].
Krishan ,G.S and Loganathan proposed a new scheme based on a visual cryptography in which binary
images is used as the key input .The secret communicated images than decomposed into three monochromatic
images based on YCbCr color space & this monochromatic images converted into binary images were
encrypted using key called share -1[5].This technique is extended by christy and seenivasgam. He uses Back
Propagation Network (BPN) to produce the two shares. Using this technique images has been produced having
same features like original [6].
B. santhi, K.S.Ravichandran, A.P. Arun & L. Chakkarapani explains using images Features. Its uses
Gray Level co-occurrence matrix of an image to extract the properties of an image [7] . Kester, QA proposed a
cryptographic algorithm, which is based on a matrix and shared secrete key. He extends his research and use
RGB Pixel to encrypt & decrypt the images [8].
Ruisong Ye and Wei Zhou proposed a chaos based scheme for image encryption .In which chaotic
orbits is constructed by using a 3d skew tent map with three control parameters. This generation is used to
scramble the pixel positions .This approach having same good qualities such as sensitivity to initial control
parameters pseudo-randomness [9]. Extension to this approach for increasing the security purpose, Asia Mahdi
Naser alzubaidi propose a encryption technique using pixel shuffling with Henon chaotic. He divides scrambled
image into sixty four blocks rotate each one in clockwise direction with go angle. For making distortion, two
dimension Arnold Cat Mapping is applied and original position of pixel is reordered back to its original position
[10].
Amnesh Goel and Nidhi proposed a contrastive method. This method uses RGB values of pixels for
rearranging the pixel within image than encryption take place [11].
Panchami V , Varghese Paul , Amithab Wahi proposed a techniques in which massage encoded using
Unicode and encrypted using the RGB color .Hexadecimal values present for cipher color its distributes into two
equal parts and 1st
parts act as a message and 2nd
is a key[12].
III. Proposed work
In previous existing system key generation is take place using the pixel values of the 2D graphics
image. In which proposed algorithm used for extracting the pixel values as well as creating the key from
pixel[1]. For increasing the security of image during the communication and transmission we propose new
techniques. In last module we use RSA algorithm for encryption and same key is used for decryption process of
2D graphics image[2].
In this paper user having freedom to generate any type of pattern signature etc. having fixed size of
design pattern .Any image is made up of using different colors pixels. Each pixel having three components ass
RGB . This RGB values first of all extracted and after shuffling we get cipher image. It’s done only by using a
RGB values.
In this method we not use the bit values of pixel as well as pixel expansion at the end of the encryption
and decryption process. Pixel having numeric values which interchanged or the RGB values displaced from
their original position to create a cipher text. When we add all values in between image no change take place in
original size and shape in image. All the features of an image remain unchanged during the process of
encryption and decryption [2].
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition
DOI: 10.9790/0661-17640811 www.iosrjournals.org 10 | Page
Figure 1:- Encryption and decryption of image
Figure.1 describes the architecture of encryption and decryption. We provides user interface for
designing the pattern .According to cipher algorithm we fetch the all RGB values and manipulation take place
using reshuffling ,transposition techniques for generating key. Image decomposed into three components which
act upon the cipher algorithm. That components form the all features and characteristics of original image.
Within image boundaries all the RGB values are shuffled and interchanged, created array is different for all
components.
Figure 2: The flow chart diagram for the encryption and decryption process.
Figure.2 describes the flow of encryption and decryption process. In which first of all we accept the
image, fetch all the RGB components using cipher algorithm and convert plain text in to cipher text. We use
RSA algorithm for the encryption process. In which key is combined with cipher text for performing encryption
process. Decryption process take place by importing all data and using reveres process of encryption. This
process is done for generating original image with its shape and size.
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition
DOI: 10.9790/0661-17640811 www.iosrjournals.org 11 | Page
IV. Advantages
In terms of security analysis transposition and reshuffling of the RGB values of 2D graphics is really
effective. Security of image against all the attacks is increased due to extra swapping of component. Using RGB
values we extract all the exact features of the image and it’s quite easy to generate exact shape and size of the
original image.
V. Experimental work
We can extract all pixel values only when image is given as an input. We can apply cipher algorithm
having following steps.
Step -2. Start
Step -2. Import data and form image by interpreting each element.
Step -3. Extract all r, g, b component from image.
Step -4. Reshape all r, g, b component in to one dimensional array for each.
Step -5. Let, t= [y; 1; p] which is a column matrix.
Step -6. Transpose ‘t’ .
Step -7. Reshape ‘t’ into one dimensional array.
Step -8. Let, n= Total number of array.
Step -9. Let, r= (1st
part of n): (1/3rd
part of n) as one dimensional array.
Step -10. Let, b= (1/3rd
part of n): (2/3rd
part of n) as one dimensional array.
Step -11. Let, g= (2/3rd
part of n): (nth) as one dimensional array.
Step -12. Transform its with its original dimensions.
Step -13. Finally all data will convert into an image.
For decrypt the image from cipher text to plain text inverse of algorithm is used.
VI. Conclusion
This paper proposed a cryptographic key generation on a 2D graphics using RGB pixel shuffling &
transposition. In this paper any size images using as an input. Small change in image creates a number of keys.
In proposed cipher algorithm in each stage different keys are generated using the RGB pixel values on which
different operations are performed.
In future we can combines different RGB values of pixel in each other and generate a new pattern for
key generation.
References
[1]. Pratik Shrivastava, Retesh jain, K.S.Raghu Wanshi, A modified. Approach of key manipulation in cryptography using 2D graphics
Image,2014.
[2]. Quist Aphetsi Kester,MIEEE, Image Encryption based on the RGB PIXEL Transposition and Shuffling,2013.
[3]. Xiukum Li, Xianggian Wu* , Ning Qi, Kuanquan Wang.Anovel cryptographic Algorithm based on iris feature ,2008.
[4]. Shujiang Xu,Yinglong Wang,Yucui Guo,Cong Wang, "A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map",
IJIGSP, vol.2, no.1, pp.61-68, 2010.
[5]. Krishnan, G.S.; Loganathan, D.; , "Color image cryptography scheme based on visual cryptography," Signal Processing,
Communication, Computing and Networking Technologies (ICSCCN), 2011 International Conference on , vol., no., pp.404-407,
21-22 July 2011
[6]. Christy, J.I.; Seenivasagam, V.; , "Construction of color Extended Visual Cryptographic scheme using Back Propagation Network
for color images," Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on , vol., no.,
pp.1101-1108, 21-22 March 2011.
[7]. B. Santhi, K.S. Ravichandran, A.P. Arun and L. Chakkarapani Novel Cryptographic Key Generation Method Using Image
Features,2012.
[8]. Kester, Quist-Aphetsi; , "A public-key exchange cryptographic technique using matrix," Adaptive Science & Technology (ICAST),
2012 IEEE 4th International Conference on , vol., no., pp.78-81, 25-27 Oct. 2012
[9]. Ruisong Ye,Wei Zhou,"A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice", IJCNIS,
vol.4, no.1, pp.38-44, 2012
[10]. Asia mahdi Naser Alzubaid,. Color Image Encryption & decryption using pixel shuffling with Henon chaotic syste,2014.
[11]. Amnesh Goel,Nidhi Chandra,"A Technique for Image Encryption with
[12]. Combination of Pixel Rearrangement Scheme Based On Sorting Group Wise Of RGB Values and Explosive Inter-Pixel
Displacement",IJIGSP, vol.4, no.2, pp.16-22, 2012.
[13]. Panchami V, Varghes Amithab Wahi, A New Color ORIENTED Cryptographic Algorithm Based on Unicode And RGB Color
Model,2014

More Related Content

What's hot

Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
IRJET Journal
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
ijcsit
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ijctet
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
eSAT Publishing House
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
IJCSEIT Journal
 
Sign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute PeopleSign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute People
paperpublications3
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
AM Publications
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
IJARIIT
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
ijcisjournal
 
Properties of Images in LSB Plane
Properties of Images in LSB PlaneProperties of Images in LSB Plane
Properties of Images in LSB Plane
IOSR Journals
 
Object Oriented Modeling of Space Efficient LSB based Steganography including...
Object Oriented Modeling of Space Efficient LSB based Steganography including...Object Oriented Modeling of Space Efficient LSB based Steganography including...
Object Oriented Modeling of Space Efficient LSB based Steganography including...
IJCSIS Research Publications
 
G0210032039
G0210032039G0210032039
G0210032039
researchinventy
 
A Fingerprint Pattern Approach to Hill Cipher Implementation
A Fingerprint Pattern Approach to Hill Cipher ImplementationA Fingerprint Pattern Approach to Hill Cipher Implementation
A Fingerprint Pattern Approach to Hill Cipher Implementation
Universitas Pembangunan Panca Budi
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
IJMER
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 

What's hot (18)

Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
Sign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute PeopleSign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute People
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Properties of Images in LSB Plane
Properties of Images in LSB PlaneProperties of Images in LSB Plane
Properties of Images in LSB Plane
 
Object Oriented Modeling of Space Efficient LSB based Steganography including...
Object Oriented Modeling of Space Efficient LSB based Steganography including...Object Oriented Modeling of Space Efficient LSB based Steganography including...
Object Oriented Modeling of Space Efficient LSB based Steganography including...
 
G0210032039
G0210032039G0210032039
G0210032039
 
A Fingerprint Pattern Approach to Hill Cipher Implementation
A Fingerprint Pattern Approach to Hill Cipher ImplementationA Fingerprint Pattern Approach to Hill Cipher Implementation
A Fingerprint Pattern Approach to Hill Cipher Implementation
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Viewers also liked

J017216164
J017216164J017216164
J017216164
IOSR Journals
 
J1802048185
J1802048185J1802048185
J1802048185
IOSR Journals
 
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
Preventing Web-Proxy Based DDoS using Request Sequence Frequency Preventing Web-Proxy Based DDoS using Request Sequence Frequency
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
IOSR Journals
 
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
IOSR Journals
 
A017650104
A017650104A017650104
A017650104
IOSR Journals
 
N010617783
N010617783N010617783
N010617783
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H010424954
H010424954H010424954
H010424954
IOSR Journals
 
B1303020508
B1303020508B1303020508
B1303020508
IOSR Journals
 
I010415255
I010415255I010415255
I010415255
IOSR Journals
 
D010221620
D010221620D010221620
D010221620
IOSR Journals
 
A018130110
A018130110A018130110
A018130110
IOSR Journals
 
I017245865
I017245865I017245865
I017245865
IOSR Journals
 
K010326568
K010326568K010326568
K010326568
IOSR Journals
 
E1102023442
E1102023442E1102023442
E1102023442
IOSR Journals
 
Face Image Restoration based on sample patterns using MLP Neural Network
Face Image Restoration based on sample patterns using MLP Neural NetworkFace Image Restoration based on sample patterns using MLP Neural Network
Face Image Restoration based on sample patterns using MLP Neural Network
IOSR Journals
 
A1803040103
A1803040103A1803040103
A1803040103
IOSR Journals
 
Q01262105114
Q01262105114Q01262105114
Q01262105114
IOSR Journals
 
E1803033337
E1803033337E1803033337
E1803033337
IOSR Journals
 
A010220109
A010220109A010220109
A010220109
IOSR Journals
 

Viewers also liked (20)

J017216164
J017216164J017216164
J017216164
 
J1802048185
J1802048185J1802048185
J1802048185
 
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
Preventing Web-Proxy Based DDoS using Request Sequence Frequency Preventing Web-Proxy Based DDoS using Request Sequence Frequency
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
 
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
 
A017650104
A017650104A017650104
A017650104
 
N010617783
N010617783N010617783
N010617783
 
I011125160
I011125160I011125160
I011125160
 
H010424954
H010424954H010424954
H010424954
 
B1303020508
B1303020508B1303020508
B1303020508
 
I010415255
I010415255I010415255
I010415255
 
D010221620
D010221620D010221620
D010221620
 
A018130110
A018130110A018130110
A018130110
 
I017245865
I017245865I017245865
I017245865
 
K010326568
K010326568K010326568
K010326568
 
E1102023442
E1102023442E1102023442
E1102023442
 
Face Image Restoration based on sample patterns using MLP Neural Network
Face Image Restoration based on sample patterns using MLP Neural NetworkFace Image Restoration based on sample patterns using MLP Neural Network
Face Image Restoration based on sample patterns using MLP Neural Network
 
A1803040103
A1803040103A1803040103
A1803040103
 
Q01262105114
Q01262105114Q01262105114
Q01262105114
 
E1803033337
E1803033337E1803033337
E1803033337
 
A010220109
A010220109A010220109
A010220109
 

Similar to B017640811

Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
IJNSA Journal
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
IRJET Journal
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing Images
MangaiK4
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET Journal
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
IRJET Journal
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
IRJET Journal
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
Universitas Pembangunan Panca Budi
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
Editor IJMTER
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
Aparna Nk
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
IJRAT
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
ANUP PALARAPWAR
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
csandit
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
inventionjournals
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
 

Similar to B017640811 (20)

Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing Images
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 
C011121114
C011121114C011121114
C011121114
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 
C011121114
C011121114C011121114
C011121114
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

B017640811

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. IV (Nov – Dec. 2015), PP 08-11 www.iosrjournals.org DOI: 10.9790/0661-17640811 www.iosrjournals.org 8 | Page A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition 1 Swapnali Krushnarao Londhe., 2 Megha Dilip Jagtap., 3 Ranjeet Ravindra Shinde., 4 P.P. Belsare 1 Student of Dept. of Computer Engg., Engg., S.B.P.C.O.E.Indapur,SPPU Pune, India. 2 Student of Dept. of Computer S.B.P.C.O.E.Indapur, Pune, India. 3 Asst.Prof. of Dept.of Computer S.B.P.C.O.E.Indapur, Pune, India. Abstract: Now a day with incredible change in social media network such as mobile communication and computer, all type of a data such as audio, video, images are used for the communication .Privacy for that data is an important issue .Cryptography is one of the technique used for stopping unauthorized access and increasing integrity of that data. In this research encryption and decryption scheme is used based on image pixel shuffling and transposition. We can use cipher algorithm for generating key using RGB values of the pixel. For that purpose we use m*n size image on which different operations are performed. This algorithm was implemented in java language. Keywords: Cryptography, Encryption, Decryption, Cipher text, Pixel, 2D graphics image, Integrity, key I. Introduction We cannot think about the world without communication .Now a day’s hiding of data from unauthorized person is an important task .There is many online services present in which communication take place through social media network. In that case there is high probability of hacking [1]. Integrity of a data is not maintained well. Different techniques are used to maintain a security in all social networks communication. These techniques such as cryptography and stenography . Cryptography is the best technique to increase the security between communications. It’s applied on a different type of data such as text, image, video etc. In cryptography two different processes are there, first is encryption in which specific key is used to encrypt the data. It is a process of converting plain text in to cipher text and second is decryption in which cipher text is converting into plain text. Two things are important for performing encryption and decryption, first is algorithm and second is key. Plain text is combined with the algorithm to form a key[1]. This generated key is then used for the encryption process .This cipher text is applied to the algorithm for generating the plain text. Symmetric and asymmetric are the two approaches of encryption .In symmetric same cryptographic key is used for encryption and decryption but in decryption different key’s are used for processing. In this approach keys are identical or combination of different keys. Image is made up of different color pixel s its nothing but the array of pixel having rectangular shape. Every pixel having different colors at a single point, so pixel is a single color dot. Digital approximation can be resulted from that color dot using this values reconstruction of that image take place. Digital image having two types first is color image made up of color pixels. Color pixel holds primary colors such as red, blue and green. This values proportion used for creating secondary colors. If each primary contain the 256 levels then four byte memory required for each. Bi-level image having single bit to represent each pixel . It’s having only two states with color black and white [2]. In this paper we focused on key part. In image based cryptographic technique, cipher algorithm of m*n size image used for fetching RGB pixel values. Encryption and decryption of an m*n size image is based on the RGB pixel values. Property of 2D graphics image is only viewing and listing image dimensions is sometimes impossible for generating the image. Paper having following structure, II section is related to related work. III section gives information related to proposed system, IV section represent the advantages, V section proposes experimental work with some mathematical part.VI provides the overall summary of our paper its concludes the paper. II. Related work Xiukun Li, Xianggian Wu*, Ning Qi, Kuanguan Wang has proposed a Novel Cryptographic algorithm containing Iris features nothing but the iris textural features. Its algorithm having Add/minus operational and read -Solomon error correcting. He defines the Region of Interest which used to differentiate different images [3]. Using another technique for a novel cryptographic some extension is given by a shujiang Xu.yinglong
  • 2. A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition DOI: 10.9790/0661-17640811 www.iosrjournals.org 9 | Page Wang, Yucui Geo &Cong Wang. He uses a nonlinear chaotic map and means of XOR operations to encrypt a novel image. In which two rounds are proposed for encryptions [4]. Krishan ,G.S and Loganathan proposed a new scheme based on a visual cryptography in which binary images is used as the key input .The secret communicated images than decomposed into three monochromatic images based on YCbCr color space & this monochromatic images converted into binary images were encrypted using key called share -1[5].This technique is extended by christy and seenivasgam. He uses Back Propagation Network (BPN) to produce the two shares. Using this technique images has been produced having same features like original [6]. B. santhi, K.S.Ravichandran, A.P. Arun & L. Chakkarapani explains using images Features. Its uses Gray Level co-occurrence matrix of an image to extract the properties of an image [7] . Kester, QA proposed a cryptographic algorithm, which is based on a matrix and shared secrete key. He extends his research and use RGB Pixel to encrypt & decrypt the images [8]. Ruisong Ye and Wei Zhou proposed a chaos based scheme for image encryption .In which chaotic orbits is constructed by using a 3d skew tent map with three control parameters. This generation is used to scramble the pixel positions .This approach having same good qualities such as sensitivity to initial control parameters pseudo-randomness [9]. Extension to this approach for increasing the security purpose, Asia Mahdi Naser alzubaidi propose a encryption technique using pixel shuffling with Henon chaotic. He divides scrambled image into sixty four blocks rotate each one in clockwise direction with go angle. For making distortion, two dimension Arnold Cat Mapping is applied and original position of pixel is reordered back to its original position [10]. Amnesh Goel and Nidhi proposed a contrastive method. This method uses RGB values of pixels for rearranging the pixel within image than encryption take place [11]. Panchami V , Varghese Paul , Amithab Wahi proposed a techniques in which massage encoded using Unicode and encrypted using the RGB color .Hexadecimal values present for cipher color its distributes into two equal parts and 1st parts act as a message and 2nd is a key[12]. III. Proposed work In previous existing system key generation is take place using the pixel values of the 2D graphics image. In which proposed algorithm used for extracting the pixel values as well as creating the key from pixel[1]. For increasing the security of image during the communication and transmission we propose new techniques. In last module we use RSA algorithm for encryption and same key is used for decryption process of 2D graphics image[2]. In this paper user having freedom to generate any type of pattern signature etc. having fixed size of design pattern .Any image is made up of using different colors pixels. Each pixel having three components ass RGB . This RGB values first of all extracted and after shuffling we get cipher image. It’s done only by using a RGB values. In this method we not use the bit values of pixel as well as pixel expansion at the end of the encryption and decryption process. Pixel having numeric values which interchanged or the RGB values displaced from their original position to create a cipher text. When we add all values in between image no change take place in original size and shape in image. All the features of an image remain unchanged during the process of encryption and decryption [2].
  • 3. A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition DOI: 10.9790/0661-17640811 www.iosrjournals.org 10 | Page Figure 1:- Encryption and decryption of image Figure.1 describes the architecture of encryption and decryption. We provides user interface for designing the pattern .According to cipher algorithm we fetch the all RGB values and manipulation take place using reshuffling ,transposition techniques for generating key. Image decomposed into three components which act upon the cipher algorithm. That components form the all features and characteristics of original image. Within image boundaries all the RGB values are shuffled and interchanged, created array is different for all components. Figure 2: The flow chart diagram for the encryption and decryption process. Figure.2 describes the flow of encryption and decryption process. In which first of all we accept the image, fetch all the RGB components using cipher algorithm and convert plain text in to cipher text. We use RSA algorithm for the encryption process. In which key is combined with cipher text for performing encryption process. Decryption process take place by importing all data and using reveres process of encryption. This process is done for generating original image with its shape and size.
  • 4. A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition DOI: 10.9790/0661-17640811 www.iosrjournals.org 11 | Page IV. Advantages In terms of security analysis transposition and reshuffling of the RGB values of 2D graphics is really effective. Security of image against all the attacks is increased due to extra swapping of component. Using RGB values we extract all the exact features of the image and it’s quite easy to generate exact shape and size of the original image. V. Experimental work We can extract all pixel values only when image is given as an input. We can apply cipher algorithm having following steps. Step -2. Start Step -2. Import data and form image by interpreting each element. Step -3. Extract all r, g, b component from image. Step -4. Reshape all r, g, b component in to one dimensional array for each. Step -5. Let, t= [y; 1; p] which is a column matrix. Step -6. Transpose ‘t’ . Step -7. Reshape ‘t’ into one dimensional array. Step -8. Let, n= Total number of array. Step -9. Let, r= (1st part of n): (1/3rd part of n) as one dimensional array. Step -10. Let, b= (1/3rd part of n): (2/3rd part of n) as one dimensional array. Step -11. Let, g= (2/3rd part of n): (nth) as one dimensional array. Step -12. Transform its with its original dimensions. Step -13. Finally all data will convert into an image. For decrypt the image from cipher text to plain text inverse of algorithm is used. VI. Conclusion This paper proposed a cryptographic key generation on a 2D graphics using RGB pixel shuffling & transposition. In this paper any size images using as an input. Small change in image creates a number of keys. In proposed cipher algorithm in each stage different keys are generated using the RGB pixel values on which different operations are performed. In future we can combines different RGB values of pixel in each other and generate a new pattern for key generation. References [1]. Pratik Shrivastava, Retesh jain, K.S.Raghu Wanshi, A modified. Approach of key manipulation in cryptography using 2D graphics Image,2014. [2]. Quist Aphetsi Kester,MIEEE, Image Encryption based on the RGB PIXEL Transposition and Shuffling,2013. [3]. Xiukum Li, Xianggian Wu* , Ning Qi, Kuanquan Wang.Anovel cryptographic Algorithm based on iris feature ,2008. [4]. Shujiang Xu,Yinglong Wang,Yucui Guo,Cong Wang, "A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map", IJIGSP, vol.2, no.1, pp.61-68, 2010. [5]. Krishnan, G.S.; Loganathan, D.; , "Color image cryptography scheme based on visual cryptography," Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011 International Conference on , vol., no., pp.404-407, 21-22 July 2011 [6]. Christy, J.I.; Seenivasagam, V.; , "Construction of color Extended Visual Cryptographic scheme using Back Propagation Network for color images," Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on , vol., no., pp.1101-1108, 21-22 March 2011. [7]. B. Santhi, K.S. Ravichandran, A.P. Arun and L. Chakkarapani Novel Cryptographic Key Generation Method Using Image Features,2012. [8]. Kester, Quist-Aphetsi; , "A public-key exchange cryptographic technique using matrix," Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference on , vol., no., pp.78-81, 25-27 Oct. 2012 [9]. Ruisong Ye,Wei Zhou,"A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice", IJCNIS, vol.4, no.1, pp.38-44, 2012 [10]. Asia mahdi Naser Alzubaid,. Color Image Encryption & decryption using pixel shuffling with Henon chaotic syste,2014. [11]. Amnesh Goel,Nidhi Chandra,"A Technique for Image Encryption with [12]. Combination of Pixel Rearrangement Scheme Based On Sorting Group Wise Of RGB Values and Explosive Inter-Pixel Displacement",IJIGSP, vol.4, no.2, pp.16-22, 2012. [13]. Panchami V, Varghes Amithab Wahi, A New Color ORIENTED Cryptographic Algorithm Based on Unicode And RGB Color Model,2014