Securing Images through Cipher Design for Cryptographic Applications

被引:0
|
作者
Prabha, Punya, V [1 ]
Nandeesh, M. D. [2 ]
Tejaswini, S. [3 ]
机构
[1] Ramaiah Inst Technol, Elect & Commun Engn, Bangalore, Karnataka, India
[2] Ramaiah Inst Technol, Elect & Instrumentat Engn, Bangalore, Karnataka, India
[3] Ramaiah Inst Technol, Med Elect & Engn, Bangalore, Karnataka, India
关键词
Decryption; encryption; Latin square generator; sequence generator; SCHEME;
D O I
10.14569/IJACSA.2021.0121216
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The emphasis of this work is image encoding based on permutation as well as changes that utilize Latin cube as well as Latin square image cipher meant for both color and gray images. Generally, multimedia data are transmitted in the network as well websites, numerous methods have been established for securing the information without any negotiation. Security of information in all the areas is required to ensure that the information sustains privacy, is presentable for recovery as well as governance purposes. These data can be secured by taking CIA (confidentiality, Integrity, and Availability) to realize information like confidentiality about the data that can be reserved as undisclosed from an illegal user of source, the integrity of the data is maintained unaffected for unauthorized font, availability of resources for official personal to retrieve data for access the information. Authentication of a person is by identification, conserving information and its validation of data. Implementing this authentication will store the data in the required format that is either exchanged or transmitted for the internet application. By breaching the misuse of data is can be protected for confidential as well as sensitive data. To achieve security and maintain confidentiality cryptographic methods are implemented.
引用
收藏
页码:119 / 125
页数:7
相关论文
共 50 条
  • [1] A novel stream cipher for cryptographic applications
    Horan, David
    Guinee, Richard
    [J]. MILCOM 2006, VOLS 1-7, 2006, : 978 - +
  • [2] Securing Digital Images using Stream Cipher and MDS Matrix
    Gaffar A.
    Joshi A.B.
    Kumar D.
    [J]. SN Computer Science, 2021, 2 (6)
  • [3] Securing recognized multimodal biometric images using cryptographic model
    Evangelin, L. Nisha
    Fred, A. Lenin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (12) : 18735 - 18752
  • [4] Securing recognized multimodal biometric images using cryptographic model
    L. Nisha Evangelin
    A. Lenin Fred
    [J]. Multimedia Tools and Applications, 2021, 80 : 18735 - 18752
  • [5] Suitability of Different Cryptographic Approaches for Securing Data Centric Applications
    Saha, Sayantani
    Neogy, Sarmistha
    Paul, Ananya
    Sengupta, Jayasree
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 603 - 608
  • [6] Implementation Of Affine Transform Method And Advanced Hill Cipher For Securing Digital Images
    Sazaki, Yoppy
    Putra, Robby Sandhy
    [J]. 2016 10TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2016,
  • [7] Homomorphic additive lightweight block cipher scheme for securing IoT applications
    Hariss, Khalil
    Noura, Hassan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76
  • [8] Design and Implementation of Dynamic Key Based Stream Cipher for Cryptographic Processor
    Pandian, K. K. Soundra
    Pal, Saptadeep
    Chandra, Kailash
    [J]. 2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [9] Session Key Based an Efficient Cryptographic Scheme of Images for Securing Internet of Things
    Vidwans A.
    Ramaiya M.
    [J]. SN Computer Science, 4 (5)
  • [10] Compiling and securing cryptographic protocols
    Chevalier, Yannick
    Rusinowitch, Michael
    [J]. INFORMATION PROCESSING LETTERS, 2010, 110 (03) : 116 - 122