Call for Paper - July 2023 Edition
IJCA solicits original research papers for the July 2023 Edition. Last date of manuscript submission is June 20, 2023. Read More

Securing Informative Text using Color Visual Cryptography

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Anand Bali, Saud Ansari, Kalim Khan, Wasif Shaikh

Anand Bali, Saud Ansari, Kalim Khan and Wasif Shaikh. Article: Securing Informative Text using Color Visual Cryptography. International Journal of Computer Applications 136(5):30-33, February 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Anand Bali and Saud Ansari and Kalim Khan and Wasif Shaikh},
	title = {Article: Securing Informative Text using Color Visual Cryptography},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {136},
	number = {5},
	pages = {30-33},
	month = {February},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


The rising threats to information security are increasing at an alarming rate. The most powerful and universal approach to counter such threats is encryption. Conventional encryption techniques use substitution and transposition. Substitution technique change plaintext into cipher text. In all conventional substitution techniques characters, numbers and special symbols are replaced with other characters, numbers and special symbols. In this project, an innovative substitution method is proposed to generate a better cipher than the existing substitution algorithms. This method re-emphasizes on the substitution of characters, numbers and special symbols/characters with color blocks. This project is based on Play Color Cipher. The crypt-analysis is done on this will prove that the cipher is strong.


  1. Maram Balajee, ” UNICODE and Colors Integration tool for Encryption and Decryption”, International Journal on Computer Science and Engineering (IJCSE) Vol. 3 No. 3 Mar 2011.
  2. William Stallings, “Cryptography and Network Security, Principles and practice”, 5th edition, 2008.
  3. R.L.Rivest, Shamir and Adleman, “A Method of Obtaining Digital Signatures and Public Key Cyryptosystems Laboratory for Computer Science”, MIT Cambridge, 1978.
  4. B.A.Forouzan, “Cryptography and Network Security", 4th edition, 2008.
  5. Johan Hastad, “On using RSA with low exponent in a public key network”, Advances in Cryptology- CRYPTO ‟85, LNCS 218, pp. 403-408 1986.
  6. Nguyen, H. Number Theory and the RSA Public Key Cryptosystem.
  7. National Bureau of Standards “Data Encryption Standard” FIPS-PUB, 46, Washington, D.C., Jan 1977. Accessed on 25/01/2016
  8. Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, 2011, Biclique Cryptanalysis of the Full AES
  9. Debdeep Mukhopadhyay, IIT Kharagpur, Accessed on 25/01/2016
  10. Prof. K. RavindraBabu, Dr.S.Udaya Kumar, Dr.A.VinayaBabu and Dr.Thirupathi Reddy, “A block cipher generation using color substitution”,International Journal of Computer Applications Volume 1 – No. 28, 2010.
  11. Devyani Patil, Vishakha Nayak, Akshaya Sanghavi, Aparna Bannore, “Cryptography based on Color Substitution”, International Journal of Computer Application Volume 91 – No.16, April 2014.


Cryptography, security, encryption, decryption, substitution, Play Color Cipher