CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Grid-based Image Encryption using RSA

by Binay Kumar Singh, Sudhir Kumar Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 1
Year of Publication: 2015
Authors: Binay Kumar Singh, Sudhir Kumar Gupta
10.5120/20116-2166

Binay Kumar Singh, Sudhir Kumar Gupta . Grid-based Image Encryption using RSA. International Journal of Computer Applications. 115, 1 ( April 2015), 26-29. DOI=10.5120/20116-2166

@article{ 10.5120/20116-2166,
author = { Binay Kumar Singh, Sudhir Kumar Gupta },
title = { Grid-based Image Encryption using RSA },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 1 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number1/20116-2166/ },
doi = { 10.5120/20116-2166 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:53:38.259054+05:30
%A Binay Kumar Singh
%A Sudhir Kumar Gupta
%T Grid-based Image Encryption using RSA
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 1
%P 26-29
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, security of several kinds of images is a major issue in secure data communication over any unreliable network. In this paper, a new technique to secure images by using grid-based encryption and decryption approach with RSA cryptosystem has been devised. This approach has taken original image, performed block transformation followed by grid transformation, then finally a public key cryptosystem is applied pixel-by-pixel to secure image. Experimental images have been taken and performed encryption and decryption to elaborate this technique. Error analysis shows that the technique is robust.

References
  1. Biryukov A. , Kushilevitz E. Proceedings of CRYPTO'98, 1462:72-88, 1998. From differential cryptanalysis to cipher-only attacks.
  2. Rivest R. , Shamir A. , Adleman L. Communications of the ACM, Feb 1978. A method for obtaining digital signatures and public key cryptosystems.
  3. Lamba C. S. , Second International Conference on Communication Software and Networks, 2010. Design and Analysis of Stream Cipher for Network Security.
  4. Lian, Shiguo. CRC Press, 2008. Multimedia Content Encryption: Algorithms and Application.
  5. Stallings W. 4th edition, Pearson Education Inc, 2006. Cryptography and Network Security Principles and Practices.
  6. Ding, W. and Marchionini, G. 1997. A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  7. C. Kaufman, R. Perlman, M. Speciner. Prentice Hall 1995. Network security.
  8. Rivest, Ronald L. Shmir A. Len A. MIT Laboratory for Computer Science Technical Memorandum 82 (April 1977). On Digital Signatures and Public Key Cryptosystems.
  9. Flinn, Patrick J. and Jordan, James M. Alston & Bird LLP, July 9, 1997. Using the RSA Algorithm for Encryption and Digital Signatures: Can You Encrypt, Decrypt, Sign and Verify without Infringing the RSA Patent?
  10. Juneja Mamta, Sandhu Parvinder S. International Conference on Advances in Recent Technologies in Communication and Computing, Pages No. 302 – 305, 27-28 Oct. , 2009. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption.
  11. Paar Christof, Pelzl Jan. ISBN 978-3-642-04100-6, Springer, 2010. Understanding Cryptography.
  12. Furht Borko, Kirovski Darko. ISBN: 0-8493-7212-7, 2006. Multimedia Encryption and Authentication Techniques and Applications.
  13. Katz Jonathan, Lindell Yehuda. ISBN: 978-1-58488-551-1, 2008. Introduction to Modern Cryptography: Principles and Protocols.
  14. Hoffstein Jeffrey, Pipher Jill, Silverman Joseph H. ISBN: 978-0-387-77993-5, 2008. An Introduction to Mathematical Cryptography.
Index Terms

Computer Science
Information Sciences

Keywords

Block Shuffling Grid Shuffling Grid-Based Encryption (GBE) Grid-Based Decryption (GBD).