Image Encryption and Decryption in Public Key Cryptography based on MR

被引:0
|
作者
Amalarethinam, D. I. George [1 ]
Geetha, J. Sai [2 ]
机构
[1] Jamal Mohamed Coll, Tiruchirappalli, India
[2] Nehru Mem Coll, Dept Comp Sci, Puthanampatti, Trichy, India
关键词
Communication Security; Image Encryption and Decryption; Public Key Cryptography; Public key; Secret key; Magic Rectangle;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the past decade, image encryption is given much attention in research of information security and a lot of image encryption algorithms have been introduced. Due to some intrinsic features of images like bulk data capacity and high data redundancy, the encryption of image is different from that of text; therefore it is difficult to handle them by traditional encryption methods. In the proposed work, a new image encryption algorithm based on Magic Rectangle (MR) is being applied. To begin with, the plain-image is converted into blocks of single bytes and then the block is replaced as the value of MR. Further, the control parameters of Magic Rectangle (MR) are selected randomly by the user. Subsequently the image is being encrypted with public key cryptography algorithms such as RSA, ElGamal etc. The experimental result shows that the proposed algorithm can successfully encrypt/decrypt the images with separate secret keys, and the algorithm has good encryption effect. Cipher text developed by this method will be entirely different when compared to the original image file and will be suitable for the secured transmission over the internet. Thus, this model provides an additional level of security to public key algorithm and efficient utilization of memory.
引用
下载
收藏
页码:133 / 138
页数:6
相关论文
共 50 条
  • [41] Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions
    Sakai, Yusuke
    Emura, Keita
    Schuldt, Jacob C. N.
    Hanaoka, Goichiro
    Ohta, Kazuo
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 77 - 92
  • [42] Hierarchical identity-based encryption without key delegation in decryption
    Luo, Song
    Chen, Zhong
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (02) : 71 - 79
  • [43] Key Generation Using Generalized Pell's Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis
    Raghunandan, K. R.
    Ganesh, Aithal
    Surendra, Shetty
    Bhavya, K.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2020, 20 (03) : 86 - 101
  • [44] Image Encryption and Decryption Using Combined Key Sequence of Logistic map and Lozi map
    Rohith, S.
    Sujatha, B. K.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1053 - 1058
  • [45] White-Box cryptography based data encryption-decryption scheme for IoT environment
    Saha, Arunima
    Srinivasan, Chungath
    2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 637 - 641
  • [46] From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments
    Hhan, Minki
    Morimae, Tomoyuki
    Yamakawa, Takashi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I, 2023, 14004 : 639 - 667
  • [47] Memristor- based Chaotic Circuit for Text/Image Encryption and Decryption
    Yang, Chenyu
    Hu, Qingqing
    Yu, Yongbin
    Zhang, Rongquan
    Yao, Yuanzhe
    Cai, Jingye
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 447 - 450
  • [48] Public key cryptography based on Moufang loops
    Chee, Wing Loon
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2411 - 2427
  • [49] Data Encryption and Decryption Using image Steganography
    EC Department, SRMCEM, India
    Research Square, 1600,
  • [50] Improved SSL application using Session Key based Double Key Encryption/Decryption (SDKED)
    Kbar, G
    Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004, : 294 - 300