CFP last date
20 December 2024
Reseach Article

Securing Informative Text using Color Visual Cryptography

by Anand Bali, Saud Ansari, Kalim Khan, Wasif Shaikh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 136 - Number 5
Year of Publication: 2016
Authors: Anand Bali, Saud Ansari, Kalim Khan, Wasif Shaikh
10.5120/ijca2016908418

Anand Bali, Saud Ansari, Kalim Khan, Wasif Shaikh . Securing Informative Text using Color Visual Cryptography. International Journal of Computer Applications. 136, 5 ( February 2016), 30-33. DOI=10.5120/ijca2016908418

@article{ 10.5120/ijca2016908418,
author = { Anand Bali, Saud Ansari, Kalim Khan, Wasif Shaikh },
title = { Securing Informative Text using Color Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 136 },
number = { 5 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume136/number5/24151-2016908418/ },
doi = { 10.5120/ijca2016908418 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:36:14.119775+05:30
%A Anand Bali
%A Saud Ansari
%A Kalim Khan
%A Wasif Shaikh
%T Securing Informative Text using Color Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 136
%N 5
%P 30-33
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rising threats to information security are increasing at an alarming rate. The most powerful and universal approach to counter such threats is encryption. Conventional encryption techniques use substitution and transposition. Substitution technique change plaintext into cipher text. In all conventional substitution techniques characters, numbers and special symbols are replaced with other characters, numbers and special symbols. In this project, an innovative substitution method is proposed to generate a better cipher than the existing substitution algorithms. This method re-emphasizes on the substitution of characters, numbers and special symbols/characters with color blocks. This project is based on Play Color Cipher. The crypt-analysis is done on this will prove that the cipher is strong.

References
  1. Maram Balajee, ” UNICODE and Colors Integration tool for Encryption and Decryption”, International Journal on Computer Science and Engineering (IJCSE) Vol. 3 No. 3 Mar 2011.
  2. William Stallings, “Cryptography and Network Security, Principles and practice”, 5th edition, 2008.
  3. R.L.Rivest, Shamir and Adleman, “A Method of Obtaining Digital Signatures and Public Key Cyryptosystems Laboratory for Computer Science”, MIT Cambridge, 1978.
  4. B.A.Forouzan, “Cryptography and Network Security", 4th edition, 2008.
  5. Johan Hastad, “On using RSA with low exponent in a public key network”, Advances in Cryptology- CRYPTO ‟85, LNCS 218, pp. 403-408 1986.
  6. Nguyen, H. Number Theory and the RSA Public Key Cryptosystem. http://cdn.bitbucket.org/mvngu/numtheory
  7. National Bureau of Standards “Data Encryption Standard” FIPS-PUB, 46, Washington, D.C., Jan 1977. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf Accessed on 25/01/2016
  8. Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, 2011, Biclique Cryptanalysis of the Full AES
  9. Debdeep Mukhopadhyay, IIT Kharagpur, http://cse.iitkgp.ac.in/~debdeep/courses_iitkgp/FormalCrypto/slides/Introduction.pdf Accessed on 25/01/2016
  10. Prof. K. RavindraBabu, Dr.S.Udaya Kumar, Dr.A.VinayaBabu and Dr.Thirupathi Reddy, “A block cipher generation using color substitution”,International Journal of Computer Applications Volume 1 – No. 28, 2010.
  11. Devyani Patil, Vishakha Nayak, Akshaya Sanghavi, Aparna Bannore, “Cryptography based on Color Substitution”, International Journal of Computer Application Volume 91 – No.16, April 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography security encryption decryption substitution Play Color Cipher