CFP last date
20 January 2025
Reseach Article

Data Security Throws Image processing by Blowfish Algorithm, Genetic Algorithm and LSB

by Md. Raihan Uddin, Kh. Mohaimenul Kabir, Md. Mehedi Hasan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 148 - Number 1
Year of Publication: 2016
Authors: Md. Raihan Uddin, Kh. Mohaimenul Kabir, Md. Mehedi Hasan
10.5120/ijca2016909946

Md. Raihan Uddin, Kh. Mohaimenul Kabir, Md. Mehedi Hasan . Data Security Throws Image processing by Blowfish Algorithm, Genetic Algorithm and LSB. International Journal of Computer Applications. 148, 1 ( Aug 2016), 1-3. DOI=10.5120/ijca2016909946

@article{ 10.5120/ijca2016909946,
author = { Md. Raihan Uddin, Kh. Mohaimenul Kabir, Md. Mehedi Hasan },
title = { Data Security Throws Image processing by Blowfish Algorithm, Genetic Algorithm and LSB },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 148 },
number = { 1 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume148/number1/25718-2016909946/ },
doi = { 10.5120/ijca2016909946 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:52:04.853268+05:30
%A Md. Raihan Uddin
%A Kh. Mohaimenul Kabir
%A Md. Mehedi Hasan
%T Data Security Throws Image processing by Blowfish Algorithm, Genetic Algorithm and LSB
%J International Journal of Computer Applications
%@ 0975-8887
%V 148
%N 1
%P 1-3
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The paper will represent the recent cryptographic technology to increase the security level in image processing technology and data security in Network system. Blowfish algorithm, Steganography algorithm least significant bit (LSB) and Genetic algorithm are mainly used in the paper for better security system. Blowfish algorithm provides a good encryption rate in software. it has a 64bit block size and a variable key length from 32bits up to 448 bits. The cryptographic society needs to make available the world with a new encryption standard. In the other side steganography in one of the most powerful way to conceal the existence of hidden secret data inside a cover object. All encrypted data will be hidden by Least Significance Bit (LSB). Genetic algorithms (GA) are directed random search techniques used to look for parameters that provide a good solution to a problem. Essentially they are nothing more than educated guessing. The ‘education’ comes from expressive the correctness of previous candidate solutions and the ‘guessing’ comes from combining the fitter attempts in order to evolve an improved solution. [1] For image processing system this algorithm is better. So hope paper will give most output performance.

References
  1. S. N. Sivanandam, S. N. Deepa, “Introduction to Genetic Algorithms”, Publisher Springer Publishing Company, Incorporated ©2007. Pp- 1-6.
  2. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. X (Mar-Apr. 2014), PP 80-83
  3. Mamta juneja 1, parvinder singh sandhu2 “designing of robust image steganography technique based on lsb insertion and encryption” 2009 international conference on advances in recent technologies in communication and computing.
  4. Menezes, A., Van Oorschot, P., and Vanstone, S. “Handbook of applied cryptography.” CRC Press, (1996).
  5. Journal of Embedded Systems, 2015, Vol. 3, No. 1, 11-15 Available online at http://pubs.sciepub.com/jes/3/1/2 © Science and Education Publishing DOI:10.12691/jes-3-1-2.
  6. International Journal of Computer Applications (0975 – 8887) Volume 113 – No. 13, March 2015
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Encryption Decryption Blowfish LSB Image Processing Steganography Genetic Algorithm Crossover.