Image Encryption and Decryption in Public Key Cryptography based on MR

被引:0
|
作者
Amalarethinam, D. I. George [1 ]
Geetha, J. Sai [2 ]
机构
[1] Jamal Mohamed Coll, Tiruchirappalli, India
[2] Nehru Mem Coll, Dept Comp Sci, Puthanampatti, Trichy, India
关键词
Communication Security; Image Encryption and Decryption; Public Key Cryptography; Public key; Secret key; Magic Rectangle;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the past decade, image encryption is given much attention in research of information security and a lot of image encryption algorithms have been introduced. Due to some intrinsic features of images like bulk data capacity and high data redundancy, the encryption of image is different from that of text; therefore it is difficult to handle them by traditional encryption methods. In the proposed work, a new image encryption algorithm based on Magic Rectangle (MR) is being applied. To begin with, the plain-image is converted into blocks of single bytes and then the block is replaced as the value of MR. Further, the control parameters of Magic Rectangle (MR) are selected randomly by the user. Subsequently the image is being encrypted with public key cryptography algorithms such as RSA, ElGamal etc. The experimental result shows that the proposed algorithm can successfully encrypt/decrypt the images with separate secret keys, and the algorithm has good encryption effect. Cipher text developed by this method will be entirely different when compared to the original image file and will be suitable for the secured transmission over the internet. Thus, this model provides an additional level of security to public key algorithm and efficient utilization of memory.
引用
下载
收藏
页码:133 / 138
页数:6
相关论文
共 50 条
  • [21] Design and Analysis of DNA Encryption and Decryption Technique based on Asymmetric Cryptography System
    Al-Mahdi, Hassan
    Alruily, Meshrif
    Shahin, Osama R.
    Alkhaldi, Khali
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (02) : 499 - 506
  • [22] Functional Encryption: A New Vision for Public-Key Cryptography
    Boneh, Dan
    Sahai, Amit
    Waters, Brent
    COMMUNICATIONS OF THE ACM, 2012, 55 (11) : 56 - 64
  • [23] A new public key cipher system based on image encryption
    Alam, MGR
    Hassan, MM
    Hossain, N
    Quadir, SMM
    Proceedings of the 8th Joint Conference on Information Sciences, Vols 1-3, 2005, : 1735 - 1738
  • [24] Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key
    Tran Viet Xuan Phuong
    Yang, Guomin
    Susilo, Willy
    Chen, Xiaofeng
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 252 - 269
  • [25] A Framework for Unconditionally Secure Public-Key Encryption (with Possible Decryption Errors)
    Bessonov, Mariya
    Grigoriev, Dima
    Shpilrain, Vladimir
    MATHEMATICAL SOFTWARE - ICMS 2018, 2018, 10931 : 45 - 54
  • [26] Public key broadcast encryption with low number of keys and constant decryption time
    Liu, Yi-Ru
    Tzeng, Wen-Guey
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 380 - 396
  • [27] A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm
    ZHANG Yong
    Chinese Journal of Electronics, 2017, 26 (05) : 1022 - 1031
  • [28] A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm
    Zhang Yong
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (05) : 1022 - 1031
  • [29] Image encryption/decryption algorithm based on standard chaos map
    Fan, Chun-Xia
    Jiang, Chang-Sheng
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2006, 38 (01): : 119 - 122
  • [30] Chaotic encryption and decryption of JPEG image
    Zhang, Dinghui
    Zhang, Fengdeng
    OPTIK, 2014, 125 (02): : 717 - 720