Downloads: 111 | Views: 300
Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.9 / 10
Image Compression Approach for Encryption and Decryption using RGB Content with DCT Function
Anita, Bhavneesh Malik
Abstract: in this cryptosystem, we have considered RGB images for two-dimensional (2D) data security. Security of RGB images during transmission is a major concern, discussed globally. This paper proposes a novel technique for color image security by random cipher associated with 2D discrete cosine transform. Existing techniques have discussed the security of image data on the basis of the keys only (which provide only one layer of security for image data), but in the proposed cryptosystem, the keys and the arrangement of cipher parameters are imperative for correct decryption of color image data. Additionally, key multiplication side (pre or post) with The RGB image data should inevitably be known, to correctly decrypt the encrypted image data. So, the proposed cryptosystem provides three layers of security for RGB image data. A computer simulation on standard examples and results is given to support the fixture of the scheme. Security analysis and detailed comparison between formerly developed techniques and proposed cryptosystem are also discussed for the robustness of the technique. This method will have large potential usage in the digital RGB image processing and the security of image data. There are many image encryption schemes have been proposed, each one of them has its advantages and disadvantages. This paper presents practical approach on image encryption and decryption technique using matrix transformation. The proposed scheme is useful for encryption of large amounts of data, such as digital images. First, we use discrete cosine transformation to get a blocked image. Second, a pair of keys is given by using matrix transformation. Third, the image is encrypted using private key in its transformation domain. Finally the receiver uses the public key to decrypt the encrypted messages. This technique satisfies the characters of convenient realization, less computation complexity and good security. The salient features of the proposed image encryption method are loss-less, symmetric private key encryption, a very large number of secret keys, and key-dependent pixel value replacement.
Keywords: Data security, cipher, data encryption, data decryption, cryptography, discrete cosine transform
Edition: Volume 4 Issue 6, June 2015
Pages: 2231 - 2236
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Review Papers, Electronics & Communication Engineering, India, Volume 11 Issue 12, December 2022
Pages: 143 - 144Blockchain Based Access Control System for Cloud Storage
Kamisetty Vinay
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Masters Thesis, Electronics & Communication Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1015 - 1019A High Performance Data Encryption and Masking Using AES Algorithm
Poornima TN, Dr. Somashekar K
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Electronics & Communication Engineering, India, Volume 11 Issue 4, April 2022
Pages: 1295 - 1299Implementation of Elliptic Curve Cryptography Processor for FPGA Applications
Ch. Venkateswarlu, Nirmala Teegala
Downloads: 101
M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1865 - 1868DPA Resistant AES Using a True Random Based LFSR Technique
Reenu Tomy, Vinoj P.G.
Downloads: 101
Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016
Pages: 1054 - 1061Review on Methods of Authentication of Images with Data Repair Capability
Vrushali Chirmade, Dimple Chaudhari