A New Approach For Image Cryptography Techniques

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends (IJCOT)          
 
© 2013 by IJCOT Journal
Volume-3 Issue-5                           
Year of Publication : 2013
Authors : Harpreet Singh , Dr.Naveen Dhillon , Sukhpreet Singh Bains

MLA

Harpreet Singh , Dr.Naveen Dhillon , Sukhpreet Singh Bains . "A New Approach For Image Cryptography Techniques " . International Journal of Computer & organization Trends (IJCOT), V3(5):27-31 Sep - Oct 2013, ISSN 2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract—With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia applications, security becomes an important issue of communication and storage of images Encryption and Decryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access.The principle goal of designing any encryption and decryption algorithm is to hide the original message and send the non readable text message to the receiver so that secret message communication can take place over the web. The strength of an algorithm depends on the difficulty of cracking the original message. In kind of algorithm .a combination of four S –boxes lookups, multiplications as well as fixed and data dependant rotations will be used. In this paper we would be obtaining our results by simulating the image processing by Encryption and Decryption part in MATLAB.

References-

[1] William Stallings-Cryptography and network security: Principle& Practice, second edition.
[2] Onwutalobi Anthony -Claret “using encryption technique” Department of computer science, University of Wollongong Australia.
[3] M.V. Droogenbroech , R. Benedett, “Techniques for selective encryption of uncompressed and compressed images, “In acivs 02,ghent,Belgium.proceedings of advanced concepts for intelligent vision systems,2002.
[4] S. Changgui, B. Bharat, "An efficient MPEG video encryption algorithm,”Proceedings of the symposium on reliable distributed systems, IEEE computer society Press, 1998, pp. 381-386
[5]“Data Encryption Standard,” Federal Information Processing Standards Publication No. 46, National Bureau of Standards, January 15, 1977.
[6] NoohulBasheerZain Ali, and James M Noras “OPTIMAL DATAPATH DESIGN FOR A CRYPTOGRAPHIC PROCESSOR: THE BLOWFISH ALGORITHM” Malaysian Journal of Computer Science, Vol. 14 No. 1, June 2001.
[7] P. Dang and P. M. Chau, "Image Encryption for Secure Internet Multimedia Applications', IEEE Transactions on Consumer Electronics, voI.46,no.3,pp.395-403, Aug.2000.
[8] Chengqing Li, “On the security of a class of Image Encryption Scheme”, IACR’s CryptologyePrint Archive: Report 2007/339, Aug. 2007.
[9] A. Sinha, K. Singh, "A technique for image encryption using digital signature," Source: Optics Communications, vol.218(4), pp.229-234, 2003.
[10] RasulEnayatifar and Abdul Hanan Abdullah , 2011,Image Security via Genetic Algorithm,International Conference on Computer and Software Modeling IPCSIT vol.14 (2011) IACSIT Press, Singapore.

Keywords— Image encryption, Block cipher, Decryption.