We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Secure Image Data by Double encryption

by Bhola Nath Roy, Jayant Kushwaha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 10
Year of Publication: 2010
Authors: Bhola Nath Roy, Jayant Kushwaha
10.5120/947-1325

Bhola Nath Roy, Jayant Kushwaha . Secure Image Data by Double encryption. International Journal of Computer Applications. 5, 10 ( August 2010), 28-32. DOI=10.5120/947-1325

@article{ 10.5120/947-1325,
author = { Bhola Nath Roy, Jayant Kushwaha },
title = { Secure Image Data by Double encryption },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 5 },
number = { 10 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume5/number10/947-1325/ },
doi = { 10.5120/947-1325 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:53:55.941610+05:30
%A Bhola Nath Roy
%A Jayant Kushwaha
%T Secure Image Data by Double encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 5
%N 10
%P 28-32
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is the main concern in today’s world and securing data from unauthorized access is very important. Different techniques should be used to protect confidential image data from unauthorized access as each type of data has its own features. In the natural images the values of the neighboring pixels are strongly correlated. Correlation means that the value of any given pixel can be reasonably predicted from the values of its neighbors. The proposed technique “secure image data by double encryption” provides image data security using cryptographic technique. The proposed method breaks the correlation among neighboring pixel by dividing original image into blocks of size of n pixels*n pixels (n is provided by user) and then encrypt each pixel by their position (x, y) and then encrypt each block by AES Encryption algorithm by using public key of the receiver. The result shows that the correlation between image pixels is decreased and higher entropy is achieved by using this technique.

References
  1. Mohammad Ali Bani Younes and Aman Jantan, “Image Encryption Using Block – Based Transformation Algorithm” IAENG, 35:1, IJCS_35_1_03, February 2008.
  2. Mohammad Ali Bani Younes and Aman Jantan, “An Encryption Approach Using a Combination of Permutation Technique Followed by Encryption” IJCSNS, vol 3 no 4, April 2008
  3. Rajesh Kumar Pal and Indranil Sengupta, “Enhancing File Data Security In Linux Operating System by Integrating Secure File System” June 2009.
  4. Aloha Sinha, Kehar Singh, “A technique for image encryption using digital signature”, Optics Communications, ARTICLE IN PRESS, 2003, 1-6, www.elsevier.com/locate/optcom
  5. S.S.Maniccam, N.G. Bourbakis, “Lossless image compression and encryption using SCAN”, Pattern Recognition 34 (2001), 1229-1245
  6. Jiun-In Guo, Jui-Cheng Yen, “A new mirror-like image Encr- yption algorithm and its VLSI architecture”, Department of Electronics Engineering National Lien-Ho College of Tech- nology and Commerce, Miaoli, Taiwan, Republic of China
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography public key encryption Image Correlation Image encryption Image entropy