Ijeee v1i1 03

Page 1

IJEEE, Vol. 1, Issue 1 (Jan-Feb 2014)

e-ISSN: 1694-2310 | p-ISSN: 1694-2426

DESIGN OF SELECTIVE ENCRYPTION SCHEME USING MATLAB Abhishek Thakur1, Rajesh Kumar2, Amandeep Bath3, Jitender Sharma4 1,2,3,4

Electronics & Communication Department, IGCE, Punjab, India

1

abhithakur25@gmail.com, 2errajeshkumar2002@gmail.com 3 amandeep_batth@rediffmail.com, 4er_jitender2007@yahoo.co.in

Abstract- This paper gives the idea of recent developments in the field of image security and improvements in image security. Images are used in many applications and to provide image security using image encryption and authentication. Image encryption techniques scramble the pixels of the image and decrease the correlation among the pixels, such that the encrypted image cannot be accessed by unauthorized user. This study proposes a method for encrypting the sender’s messages using new algorithm called Chaotic encryption method. This key will be used for encrypting and decrypting the messages which are transmitted between two sides. Chaotic encryption technique is the new way of cryptography. Emphasizing the image security, this paper is to design the enhanced secure algorithm which uses Chaotic encryption method to ensure improved security and reliability. Keywords— Cryptography, Cryptography key, RGB image,

LSB, image key. I. INTRODUCTION Across the internet information exchanges and the storage of data in open networks have created an environment in which illegal users can obtain the important information. Encryption algorithms have been used to provide a kind of randomness such that any unauthorized user cannot obtain the secure data. Only the authorized user having the key can obtain the original data. Images are used in many applications such as medical imaging system, military image databases, cable TV, confidential video conferencing, online personal photograph album, etc. Hence, reliable, fast and robust security techniques are required to store and transmit digital images. In open environments, there are several security problems associated with the processing and transmission of digital images. Therefore it is necessary to affirm the integrity and confidentiality of the digital image being transmitted. The various techniques used in the existing image encryption techniques can be classified into three major categories: transposition techniques (position permutation), substitution techniques (value transformation) and the combination i.e. transposition-substitution technique [1]. The position permutation techniques shuffle the pixel position within the image itself and usually have low security because histogram of the shuffled image remains same. If we talk about the value transformation techniques, they modify pixel value of the original image and have the potential of low computational complexity and low hardware cost. Finally, the combination performs both position permutation and value transformation International Journal of Electrical & Electronics Engineering

14

and has the potential of high security. Another technique for securing digital images is based on the use of chaotic functions [2]. II. TECHNIQUES USED In recent years, a number of different image encryption schemes have been proposed based on chaotic maps [3-12], in order to overcome image encryption problems. A. Cryptography The cryptography has been proposed to ensure the confidentiality and authenticity of the message. The encryption key must be long. Yet, it is difficult to remember it and even storing the key in a database or in a file may be insecure. In addition the protection of the confidentiality of encryption keys is one of the important issues to be dealt with. This issue can be efficiently solved through generating the key before starting the process of encryption and decryption, rather than storing it. Here we will use an image to generate the key. The main objective of this study is to increase security in communication by encrypting the information using a key that is created through using an image. Cryptography presents various methods for taking legible, readable data, and transforming it into unreadable data for the purpose of secure transmission, and then using a key to transform it back into readable data when it reaches its destination [8]. Cryptography is considered to be one of the fundamental building blocks of computer security [4]. The need of reliable and effective security mechanisms to protect information systems is increasing due to the rising magnitude of identity theft in our society. Although cryptography is a powerful tool to achieve information security, the security of cryptosystems relies on the fact that cryptographic keys are secret and known only to the legitimate user [9]. In secure communication, key generation phase has many challenges and this problem can be solved if the sender and the receiver share the key in any other form or if they generate the keys readily during encryption and decryption separately, thus, the concept of generating the key from an image came to the role. B. Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. In secret sharing mechanisms, the secret data is divided into several shares (images) and distributed among participants. Shares are stacked together to recover the data. Visual cryptography (VC) attempts to recover a secret image via the human visual system by stacking two or more www.ijeee-apm.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Ijeee v1i1 03 by IJEEE (Elixir Publications) - Issuu