International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111 | Views: 300

Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.9 / 10


     

Image Compression Approach for Encryption and Decryption using RGB Content with DCT Function

Anita, Bhavneesh Malik


Abstract: in this cryptosystem, we have considered RGB images for two-dimensional (2D) data security. Security of RGB images during transmission is a major concern, discussed globally. This paper proposes a novel technique for color image security by random cipher associated with 2D discrete cosine transform. Existing techniques have discussed the security of image data on the basis of the keys only (which provide only one layer of security for image data), but in the proposed cryptosystem, the keys and the arrangement of cipher parameters are imperative for correct decryption of color image data. Additionally, key multiplication side (pre or post) with The RGB image data should inevitably be known, to correctly decrypt the encrypted image data. So, the proposed cryptosystem provides three layers of security for RGB image data. A computer simulation on standard examples and results is given to support the fixture of the scheme. Security analysis and detailed comparison between formerly developed techniques and proposed cryptosystem are also discussed for the robustness of the technique. This method will have large potential usage in the digital RGB image processing and the security of image data. There are many image encryption schemes have been proposed, each one of them has its advantages and disadvantages. This paper presents practical approach on image encryption and decryption technique using matrix transformation. The proposed scheme is useful for encryption of large amounts of data, such as digital images. First, we use discrete cosine transformation to get a blocked image. Second, a pair of keys is given by using matrix transformation. Third, the image is encrypted using private key in its transformation domain. Finally the receiver uses the public key to decrypt the encrypted messages. This technique satisfies the characters of convenient realization, less computation complexity and good security. The salient features of the proposed image encryption method are loss-less, symmetric private key encryption, a very large number of secret keys, and key-dependent pixel value replacement.


Keywords: Data security, cipher, data encryption, data decryption, cryptography, discrete cosine transform


Edition: Volume 4 Issue 6, June 2015


Pages: 2231 - 2236



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Anita, Bhavneesh Malik, "Image Compression Approach for Encryption and Decryption using RGB Content with DCT Function", International Journal of Science and Research (IJSR), Volume 4 Issue 6, June 2015, pp. 2231-2236, https://www.ijsr.net/getabstract.php?paperid=17061502



Similar Articles

Downloads: 0

Review Papers, Electronics & Communication Engineering, India, Volume 11 Issue 12, December 2022

Pages: 143 - 144

Blockchain Based Access Control System for Cloud Storage

Kamisetty Vinay

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Masters Thesis, Electronics & Communication Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1015 - 1019

A High Performance Data Encryption and Masking Using AES Algorithm

Poornima TN, Dr. Somashekar K

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 11 Issue 4, April 2022

Pages: 1295 - 1299

Implementation of Elliptic Curve Cryptography Processor for FPGA Applications

Ch. Venkateswarlu, Nirmala Teegala

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1865 - 1868

DPA Resistant AES Using a True Random Based LFSR Technique

Reenu Tomy, Vinoj P.G.

Share this Article

Downloads: 101

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article



Top