Image Encryption and Decryption in Public Key Cryptography based on MR

被引:0
|
作者
Amalarethinam, D. I. George [1 ]
Geetha, J. Sai [2 ]
机构
[1] Jamal Mohamed Coll, Tiruchirappalli, India
[2] Nehru Mem Coll, Dept Comp Sci, Puthanampatti, Trichy, India
关键词
Communication Security; Image Encryption and Decryption; Public Key Cryptography; Public key; Secret key; Magic Rectangle;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the past decade, image encryption is given much attention in research of information security and a lot of image encryption algorithms have been introduced. Due to some intrinsic features of images like bulk data capacity and high data redundancy, the encryption of image is different from that of text; therefore it is difficult to handle them by traditional encryption methods. In the proposed work, a new image encryption algorithm based on Magic Rectangle (MR) is being applied. To begin with, the plain-image is converted into blocks of single bytes and then the block is replaced as the value of MR. Further, the control parameters of Magic Rectangle (MR) are selected randomly by the user. Subsequently the image is being encrypted with public key cryptography algorithms such as RSA, ElGamal etc. The experimental result shows that the proposed algorithm can successfully encrypt/decrypt the images with separate secret keys, and the algorithm has good encryption effect. Cipher text developed by this method will be entirely different when compared to the original image file and will be suitable for the secured transmission over the internet. Thus, this model provides an additional level of security to public key algorithm and efficient utilization of memory.
引用
收藏
页码:133 / 138
页数:6
相关论文
共 50 条
  • [1] Image encryption based on nonlinear encryption system and public-key cryptography
    Zhao, Tieyu
    Ran, Qiwen
    Chi, Yingying
    [J]. OPTICS COMMUNICATIONS, 2015, 338 : 64 - 72
  • [2] Classical and Quantum Cryptography for Image Encryption & Decryption
    Pawar, Harshad R.
    Harkut, Dinesh G.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN INTELLIGENT AND COMPUTING IN ENGINEERING (RICE III), 2018,
  • [3] Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography
    Zhao, Tieyu
    Ran, Qiwen
    Yuan, Lin
    Chi, Yingying
    Ma, Jing
    [J]. OPTICS AND LASERS IN ENGINEERING, 2015, 72 : 12 - 17
  • [4] Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography
    Zhang, Leihong
    Yuan, Xiao
    Wang, Kaimin
    Zhang, Dawei
    [J]. IEEE PHOTONICS JOURNAL, 2019, 11 (04):
  • [5] A new chaotic key-based design for image encryption and decryption
    Yen, JC
    Guo, JI
    [J]. ISCAS 2000: IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - PROCEEDINGS, VOL IV: EMERGING TECHNOLOGIES FOR THE 21ST CENTURY, 2000, : 49 - 52
  • [6] Optical image encryption algorithm based on hyper-chaos and public-key cryptography
    Liu, Yujia
    Jiang, Zhaoguo
    Xu, Xiping
    Zhang, Fuqi
    Xu, Jiahong
    [J]. OPTICS AND LASER TECHNOLOGY, 2020, 127
  • [7] Optical encryption based on ghost imaging and public key cryptography
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    [J]. OPTICS AND LASERS IN ENGINEERING, 2018, 111 : 58 - 64
  • [8] On Multiple Encryption for Public-Key Cryptography
    Soroceanu, Tudor
    Buchmann, Nicolas
    Margraf, Marian
    [J]. CRYPTOGRAPHY, 2023, 7 (04)
  • [9] Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption
    Cong, Kelong
    Cozzo, Daniele
    Maram, Varun
    Smart, Nigel P.
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT IV, 2021, 13093 : 125 - 155
  • [10] Encryption and Decryption Using Elliptic Curves for Public key Cryptosystems
    Srinivas, Madhira
    Porika, Sammulal
    [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1300 - 1303