Research Article

Grid-based Image Encryption using RSA

by  Binay Kumar Singh, Sudhir Kumar Gupta
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Issue 1
Published: April 2015
Authors: Binay Kumar Singh, Sudhir Kumar Gupta
10.5120/20116-2166
PDF

Binay Kumar Singh, Sudhir Kumar Gupta . Grid-based Image Encryption using RSA. International Journal of Computer Applications. 115, 1 (April 2015), 26-29. DOI=10.5120/20116-2166

                        @article{ 10.5120/20116-2166,
                        author  = { Binay Kumar Singh,Sudhir Kumar Gupta },
                        title   = { Grid-based Image Encryption using RSA },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 115 },
                        number  = { 1 },
                        pages   = { 26-29 },
                        doi     = { 10.5120/20116-2166 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A Binay Kumar Singh
                        %A Sudhir Kumar Gupta
                        %T Grid-based Image Encryption using RSA%T 
                        %J International Journal of Computer Applications
                        %V 115
                        %N 1
                        %P 26-29
                        %R 10.5120/20116-2166
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, security of several kinds of images is a major issue in secure data communication over any unreliable network. In this paper, a new technique to secure images by using grid-based encryption and decryption approach with RSA cryptosystem has been devised. This approach has taken original image, performed block transformation followed by grid transformation, then finally a public key cryptosystem is applied pixel-by-pixel to secure image. Experimental images have been taken and performed encryption and decryption to elaborate this technique. Error analysis shows that the technique is robust.

References
  • Biryukov A. , Kushilevitz E. Proceedings of CRYPTO'98, 1462:72-88, 1998. From differential cryptanalysis to cipher-only attacks.
  • Rivest R. , Shamir A. , Adleman L. Communications of the ACM, Feb 1978. A method for obtaining digital signatures and public key cryptosystems.
  • Lamba C. S. , Second International Conference on Communication Software and Networks, 2010. Design and Analysis of Stream Cipher for Network Security.
  • Lian, Shiguo. CRC Press, 2008. Multimedia Content Encryption: Algorithms and Application.
  • Stallings W. 4th edition, Pearson Education Inc, 2006. Cryptography and Network Security Principles and Practices.
  • Ding, W. and Marchionini, G. 1997. A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  • C. Kaufman, R. Perlman, M. Speciner. Prentice Hall 1995. Network security.
  • Rivest, Ronald L. Shmir A. Len A. MIT Laboratory for Computer Science Technical Memorandum 82 (April 1977). On Digital Signatures and Public Key Cryptosystems.
  • Flinn, Patrick J. and Jordan, James M. Alston & Bird LLP, July 9, 1997. Using the RSA Algorithm for Encryption and Digital Signatures: Can You Encrypt, Decrypt, Sign and Verify without Infringing the RSA Patent?
  • Juneja Mamta, Sandhu Parvinder S. International Conference on Advances in Recent Technologies in Communication and Computing, Pages No. 302 – 305, 27-28 Oct. , 2009. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption.
  • Paar Christof, Pelzl Jan. ISBN 978-3-642-04100-6, Springer, 2010. Understanding Cryptography.
  • Furht Borko, Kirovski Darko. ISBN: 0-8493-7212-7, 2006. Multimedia Encryption and Authentication Techniques and Applications.
  • Katz Jonathan, Lindell Yehuda. ISBN: 978-1-58488-551-1, 2008. Introduction to Modern Cryptography: Principles and Protocols.
  • Hoffstein Jeffrey, Pipher Jill, Silverman Joseph H. ISBN: 978-0-387-77993-5, 2008. An Introduction to Mathematical Cryptography.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Block Shuffling Grid Shuffling Grid-Based Encryption (GBE) Grid-Based Decryption (GBD).

Powered by PhDFocusTM