CFP last date
20 January 2025
Reseach Article

An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy

by Apoorva Shrivastava, Lokesh Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 139 - Number 1
Year of Publication: 2016
Authors: Apoorva Shrivastava, Lokesh Singh
10.5120/ijca2016909098

Apoorva Shrivastava, Lokesh Singh . An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy. International Journal of Computer Applications. 139, 1 ( April 2016), 42-49. DOI=10.5120/ijca2016909098

@article{ 10.5120/ijca2016909098,
author = { Apoorva Shrivastava, Lokesh Singh },
title = { An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 139 },
number = { 1 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 42-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume139/number1/24458-2016909098/ },
doi = { 10.5120/ijca2016909098 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:39:49.277524+05:30
%A Apoorva Shrivastava
%A Lokesh Singh
%T An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy
%J International Journal of Computer Applications
%@ 0975-8887
%V 139
%N 1
%P 42-49
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security in data communication is a very important concern today. It is used in almost every region like e-commerce, education, and industry and data warehouse. Securely sending and receiving data in the above area is an important as the data is crucial. Image security plays an important role in this age. As the demand of image based message sending is improving day by day. In this paper, we have proposed an efficient image cryptography system based on RC6. The key size and number of variable rounds makes RC6 more secure. The key size is variable up to 2040 bits. The results are achieved in terms of entropy and correlation coefficients. The less variation in entropy is achieved from our approach.

References
  1. A. Mitra, , Y V. Subba Rao, and S. R. M. Prasnna, "A new image encryption approach using combinational permutation techniques," Journal of computer Science,vol. 1, no. 1, p.127, 2006.
  2. A. J. Elbirt and C. Paar, “An Instruction-Level Distributed Processor for Symmetric-Key Cryptography,” IEEE Trans. Parallel and distributed systems, vol. 16, no. 5, pp. 468-480, May 2005.
  3. W. Diffie and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
  4. W. Stallings, Cryptography and Network Security. Englewood Cliffs,NJ: Prentice Hall, 2003.
  5. E. Besdok, “Hiding information in multispectral spatial images,” Int. J.Electron. Commun. (AEU) 59, pp. 15-24, 2005.
  6. S. Trivedi and R. Chandramouli, “Secret Key Estimation in Sequential Steganography,” IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 746-757, Feb. 2005.
  7. Y. Wu, “On the Security of an SVD-Based Ownership Watermarking,”IEEE Trans. Multimedia, vol. 7, no. 4, pp. 624-627, Aug. 2005.
  8. Y. T. Wu and F. Y. Shih, “An adjusted-purpose digital watermarking technique,” Pattern Recognition 37, pp. 2349-2359, 2004.
  9. Mohammad Ali Bani Younes and Aman Jantan,” Image Encryption Using Block-Based Transformation Algorithm”, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03.
  10. S. P. Nana'vati., P. K. panigrahi. "Wavelets:applications to image compression- I,". joined of the scientific and engineering computing, vol. 9, no. 3, 2004, pp. 4- 10.
  11. c. Ratael, gonzales, e. Richard, and woods, "Digital image processing," 2nd ed, Prentice hall, 2002.
  12. AL. Vitali, A. Borneo, M. Fumagalli and R. Rinaldo,"Video over IP using standard-compatible multiple description coding," Journal of Zhejiang University- Science A, vol. 7, no. 5 ,2006, pp. 668- 676.
  13. Neha Chauhan, Akhilesh A. Waoo, P. S. Patheja,” Attack Detection in Watermarked Images with PSNR and RGB Intensity”, International Journal of Advanced Computer Research (IJACR) Volume-3 Number-1 Issue-9 March-2013.
  14. G. Voyatzis, N. Nikolaidis and I. Pitas, “Digital watermarking: An overview”, EUSIPCO, vol. 1, pp. 9-12, 1998.
  15. Shikha Joshi, Pallavi Jain,” A Secure Data Sharing and Communication with Multiple Cloud Environments with Java API”, International Journal of Advanced Computer Research (IJACR) Volume 2 Number 2 June 2012.
  16. A. Sinha, K. Singh, “A technique for image encryption using digital signature," Source: Optics Communications, vol.218, no. 4, 2003.
  17. Li. Shujun, Li. Chengqing, C. Guanrong, Fellow., IEEE., Dan Zhang., and Nikolaos,G., Bourbakis Fellow., IEEE. "A general cryptanalysis of permutation-only multimedia encryption algorithms," 2004.
  18. Satish Bhalshankar and Avinash K. Gulve, " Audio Steganography: LSB Technique Using a Pyramid Structure and Range of Bytes “, International Journal of Advanced Computer Research (IJACR), Volume-5, Issue-20, September-2015, pp.233-248.
  19. Nanda Hanamant Khanapur and Arun Patro, “Design and Implementation of Enhanced version of MRC6 algorithm for data security ", International Journal of Advanced Computer Research (IJACR), Volume-5, Issue-19, June-2015, pp.225-232.
  20. Sridevi and Manajaih.D.H, “Modular Arithmetic in RSA Cryptography”, International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-17, December-2014, pp.973-978.
  21. Dubey, Ashutosh Kumar, et al. "Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment." Software Engineering (CONSEG), 2012 CSI Sixth International Conference on. IEEE, 2012.
  22. Tavse, Priyanka, and Anil Khandelwal. "A Critical Review on Data Clustering in Wireless Network." International Journal of Advanced Computer Research (IJACR) 4 (2014): 795-798.
  23. Nath, Asoke, et al. "Multi Way Feedback Encryption Standard Ver-2 (MWFES-2)." International Journal of Advanced Computer Research (IJACR) 3.1 (2013).
  24. Namrata Shukla, “Data Mining based Result Analysis of Document Fraud Detection”, International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-1, Issue-1, December-2014 ,pp.21-25.
  25. G. Zhi-Hong, H. Fangjun, and G . Wen ie , " Ch aos - based image encryption algorithm,"Department of Electrical and computer Engineering, University of Waterloo, ON N2L 3G1, Canada. Published by: Elsevier, 2005, pp. 153-157.
  26. Praloy Shankar De, Prasenjit Maiti,” DEDD Symmetric-Key Cryptosystem”, International Journal of Advanced Computer Research (IJACR) ,Volume-3 Number-1 Issue-8 March-2013.
  27. Seetaiah Kilaru, Yojana Kanukuntla, K B S Chary,” An effective algorithm for Image security based on Compression and Decomposition method”, International Journal of Advanced Computer Research (ISSN (IJACR) Volume-3 Number-1 Issue-8 March-2013.
  28. Long Bao, Yicong Zhou,C. L. Philip Chen,” A New Chaotic System for Image Encryption”, 2012 International Conference on System Science and Engineering June 30-July 2, 2012, Dalian, China.
  29. Abusukhon, Ahmad, and Mohammad Talib. "A novel network security algorithm based on private key encryption." Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on. IEEE, 2012.
  30. Mostaghim, Melika, and Reza Boostani. "CVC: Chaotic visual cryptography to enhance steganography." Information Security and Cryptology (ISCISC), 2014 11th International ISC Conference on. IEEE, 2014.
  31. Hassan, Mohamed Fahim. "Synchronization of hyperchaotic systems with application to secure communication." Systems Conference (SysCon), 2015 9th Annual IEEE International. IEEE, 2015.
  32. Li, Chun-Ta, Chin-Wen Lee, and Jau-Ji Shen. "A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service." Information Networking (ICOIN), 2015 International Conference on. IEEE, 2015.
  33. Dubey, A. K., Dubey, A. K., Agarwal, V., & Khandagre, Y. . Knowledge discovery with a subset-superset approach for Mining Heterogeneous Data with dynamic support. In Software Engineering (CONSEG), 2012 CSI Sixth International Conference on (pp. 1-6). IEEE.
  34. Haroun, M.F.; Gulliver, T.A., "Secret Key Generation Using Chaotic Signals Over Frequency Selective Fading Channels," in Information Forensics and Security, IEEE Transactions on , vol.10, no.8, pp.1764-1775, Aug. 2015.
  35. Hsien-Yu Lee and Nai-Jian Wang, “The implementation and investigation of securing web applications upon multi-platform for a single sign-on functionality", International Journal of Advanced Computer Research (IJACR), Volume-6, Issue-23, March-2016 ,pp.39-46.
  36. Rivest RL, Robshaw MJ, Sidney R, Yin YL. The RC6TM block cipher. InFirst Advanced Encryption Standard (AES) Conference 1998 Aug 20.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Chaos Steganography Security Measures.