Image Encryption and Decryption in Public Key Cryptography based on MR

被引:0
|
作者
Amalarethinam, D. I. George [1 ]
Geetha, J. Sai [2 ]
机构
[1] Jamal Mohamed Coll, Tiruchirappalli, India
[2] Nehru Mem Coll, Dept Comp Sci, Puthanampatti, Trichy, India
关键词
Communication Security; Image Encryption and Decryption; Public Key Cryptography; Public key; Secret key; Magic Rectangle;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the past decade, image encryption is given much attention in research of information security and a lot of image encryption algorithms have been introduced. Due to some intrinsic features of images like bulk data capacity and high data redundancy, the encryption of image is different from that of text; therefore it is difficult to handle them by traditional encryption methods. In the proposed work, a new image encryption algorithm based on Magic Rectangle (MR) is being applied. To begin with, the plain-image is converted into blocks of single bytes and then the block is replaced as the value of MR. Further, the control parameters of Magic Rectangle (MR) are selected randomly by the user. Subsequently the image is being encrypted with public key cryptography algorithms such as RSA, ElGamal etc. The experimental result shows that the proposed algorithm can successfully encrypt/decrypt the images with separate secret keys, and the algorithm has good encryption effect. Cipher text developed by this method will be entirely different when compared to the original image file and will be suitable for the secured transmission over the internet. Thus, this model provides an additional level of security to public key algorithm and efficient utilization of memory.
引用
收藏
页码:133 / 138
页数:6
相关论文
共 50 条
  • [31] A HIGH-SPEED DATA ENCRYPTION PROCESSOR FOR PUBLIC KEY CRYPTOGRAPHY
    ROSATI, T
    PROCEEDINGS OF THE IEEE 1989 CUSTOM INTEGRATED CIRCUITS CONFERENCE, 1989, : 311 - 315
  • [32] Optimized video internet of things using elliptic curve cryptography based encryption and decryption
    Alhayani, Bilal S. A.
    Hamid, Nagham
    Almukhtar, Firas Husham
    Alkawak, Omar A.
    Mahajan, Hemant B.
    Kwekha-Rashid, Ameer Sardar
    Ilhan, Haci
    Marhoon, Haydar Abdulameer
    Mohammed, Husam Jasim
    Chaloob, Ibrahim Zeghaiton
    Alkhayyat, Ahmed
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101
  • [33] A fast decryption algorithm for BSS-based image encryption
    Lin, Qiu-Hua
    Yin, Fu-Liang
    Liang, Hua-Lou
    ADVANCES IN NEURAL NETWORKS - ISNN 2006, PT 3, PROCEEDINGS, 2006, 3973 : 318 - 325
  • [34] Public Network Security by Bluffing the Intruders Through Encryption Over Encryption Using Public Key Cryptography Method
    Madaan, Vishu
    Sethi, Dimple
    Agrawal, Prateek
    Jain, Leena
    Kaur, Ranjit
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2017, 2017, 712 : 249 - 257
  • [35] A multidimensional image encryption and decryption technology
    Kang, Wentao
    JOURNAL OF THE FRANKLIN INSTITUTE, 2024, 361 (18)
  • [36] Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations
    Zhou, Ri-Gui
    Wu, Qian
    Zhang, Man-Qun
    Shen, Chen-Yi
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (06) : 1802 - 1817
  • [37] Hierarchical identity-based encryption without key delegation in decryption
    Chen, Z. (chen@infosec.pku.edu.cn), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (05):
  • [38] Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations
    Ri-Gui Zhou
    Qian Wu
    Man-Qun Zhang
    Chen-Yi Shen
    International Journal of Theoretical Physics, 2013, 52 : 1802 - 1817
  • [39] Revocable Identity-Based Encryption with Decryption Key Exposure Resistance
    Wang, Xiaoyi
    Chen, Hu
    Zhao, Jiangdong
    Computer Engineering and Applications, 2024, 60 (19) : 268 - 277
  • [40] Color image encryption using DNA based cryptography
    Nandy N.
    Banerjee D.
    Pradhan C.
    International Journal of Information Technology, 2021, 13 (2) : 533 - 540