CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Enhanced Blowfish Algorithm for Image Encryption and Decryption with Supplementary Key

by K. Kanagalakshm, M. Mekala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Number 5
Year of Publication: 2016
Authors: K. Kanagalakshm, M. Mekala
10.5120/ijca2016910707

K. Kanagalakshm, M. Mekala . Enhanced Blowfish Algorithm for Image Encryption and Decryption with Supplementary Key. International Journal of Computer Applications. 146, 5 ( Jul 2016), 41-52. DOI=10.5120/ijca2016910707

@article{ 10.5120/ijca2016910707,
author = { K. Kanagalakshm, M. Mekala },
title = { Enhanced Blowfish Algorithm for Image Encryption and Decryption with Supplementary Key },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 146 },
number = { 5 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 41-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume146/number5/25398-2016910707/ },
doi = { 10.5120/ijca2016910707 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:49:35.525264+05:30
%A K. Kanagalakshm
%A M. Mekala
%T Enhanced Blowfish Algorithm for Image Encryption and Decryption with Supplementary Key
%J International Journal of Computer Applications
%@ 0975-8887
%V 146
%N 5
%P 41-52
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is a major concern while sending and receiving sensitive data over web. This paper is aimed to design and develop a method to address this problem. The proposed method is based on Blowfish algorithm with enhanced features. It has been enhanced with a supplementary key approach to strengthen the security of image or any sensitive data which are communicated electronically. The proposed algorithm is developed and tested with different data sets. The performance of the proposed methods is measured in terms of time, space complexity and also security. The results are recorded and show better performance.

References
  1. Aloha Sinha and Kehar Singh, “A technique for image encryption using digital signature”, Optics Communications, Vol-2 I8 (2203),229-234.
  2. Amitava Nag, et.al “Image Encryption Using Affine Transform and XOR Operation ”,International Conference on Signal Processing, Communication,Computing and Networking Technologies (ICSCCN 2011).August, 2011.
  3. Challa Narasimham, Jayaram Pradhan,” Evaluation Of Performance Characteristics Of Cryptosystem Using Text Files” Journal of Theoretical and Applied Information Technology,pp55-59 2008.
  4. Chang-Mok Shin, et.al “ Multilevel Image Encryption by Binary Phase XOR Operations”, IEEE Proceeding in the year 2003.
  5. Chin-Chen Chang, et.al “A new encription algorithm for image cryptosystems ”, The Journal of Systems and Software 58 , 83-91,2001.
  6. Fethi Belkhouche and Uvais Qidwai , “Binary image encoding using 1D chaotic maps”, IEEE Proceeding in the year 2003.
  7. Gao, H., Zhang, Y., Liang, S., & Li, D. 2006. A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 29(2), 393-399.
  8. Gebze and Kocaeli,2005, “Analysis And Comparison Of Image Encryption Algorithms”.
  9. Guosheng Gu and Guoqiang Han, “An Enhanced Chaos Based Image Encryption Algorithm”, IEEE Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC'06) in 2006.
  10. Huang-Pei Xiao Guo-Ji Zhang, “An Image Encryption Scheme Based On Chaotic Systems”, IEEE Proceedings of the Fifth International Conference on Machine Learning and Cybernetics,Dalian, 13-16 August 2006.
  11. Ibrahim S I Abuhaiba and Maaly A S Hassan, “Image Encryption Using Differential Evolution Approach In Frequency Domain” , Signal & Image Processing An International Journal (SIPIJ) Vol.2, No.1,March 2011.
  12. Ismail Amr Ismail, et.al ,”A Digital Image Encryption Algorithm Based a Composition of Two Chaotic Logistic Maps”, International Journal of Network Security, Vol.11, No.1, PP.1 -10, July 2010.
  13. Jawahar Thakur and Nagesh Kumar,DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis, International Journal of Emerging Technology and Advanced Engineering, 2011.
  14. Jiancheng Zou , et.al , Dongxu Qi, “A New Digital Image Scrambling Method Based on Fibonacci Number,”Proceeding of the IEEE Inter Symposium On Circuits and Systems,Vancouver ,Canada ,Vol .03 , PP .965-968 , 2004.
  15. Kamali, S.H., et.al “A new modified version of Advance Encryption Standard based algorithm for image encryption”,Electronics and Information Engineering (ICEIE), 2010, International Conference .
  16. M. Zeghid,et.al, “A Modified AES Based Algorithm for Image Encryption”, World Academy of Science, Engineering and Technology 27, 2007.
  17. Mohammad Ali Bani Younes and Aman Jantan, “An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption” , IJCSNS International Journal of Computer Science and Network Security, VOL.8 , April 2008.
  18. Monika Agrawal and Pradeep Mishra,” A Comparative Survey on Symmetric Key Encryption Techniques”, International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 05 May 2012, PP877- 882.
  19. Pia Singh and Prof. Karamjeet Singh “Image Encryption And Decryption Using Blowfish Algorithm In Matlab”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013.
  20. Prasithsangaree.P and Krishnamurthy.P, “Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs,” in the Proceedings of the IEEE GLOBECOM 2003, pp. 1445-1449.
  21. Qais H. Alsafasfeh and Aouda A. Arfoa, “Image Encryption Based on the General Approach for Multiple Chaotic Systems”, Journal of Signal and Information Processing, 2011.
  22. Qiudong Sun, et.al , “Image Encryption Based on Bit-plane Decomposition and Random Scrambling”, Journal of Shanghai Second Polytechnic University ,vol. 09 IEEE, 2012.
  23. Rasul Enayatifar and Abdul Hanan Abdullah, “Image Security via Genetic Algorithm”, 2011 International Conference on Computer and Software Modeling IPCSIT vol.14.
  24. Rinki Pakshwar et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (1), 2013, 113 – 116.
  25. S.S.Maniccam and N.G.Bourbakis, “Lossless image compression and encryption using SCAN”, Pattern Recognition 34, 1229- 1245,2001.
  26. Sesha Pallavi, et.al ,“Permutation based Image Encryption Technique”, International Journal of Computer Applications (0975 – 8887) Volume 28 ,No.8, 2011.
  27. Seyed Mohammad Seyedzade, et.al , “A Novel Image Encryption Algorithm Based on Hash Function”, 6th Iranian Conference on Machine Vision and Image Processing, 2010.
  28. Shuqun Zhang and Mohammed A. Karim, “Color image encryption using double random phase encoding”, Microwave and Optical Technology Letters Vol. 21, No. 5, 318-322 , June 5 1999.
  29. Song, Z., et.al, “A secure and efficient fingerprint images encryption scheme”. In Young Computer Scientists, 2008. The 9th International Conference for (pp. 2803-2808). IEEE.
  30. Tariq Shah, Iqtadar Hussain, Muhammad Asif Gondal , Hasan Mahmood, “Statistical analysis of S-box in image encryption applications based on majority logic criterion”, International Journal of the Physical Sciences Vol. 6(16), pp. 4110-4127.
  31. Wang Ying, Zheng DeLing, Ju Lei, et al., “The Spatial-Domain Encryption of Digital Images Based on High-Dimension Chaotic System”, Proceeding of 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 1172-1176, December. 2004.
  32. Cryptography www.cryptographyworld.com/concept.htm
  33. K.Kanagalakshmi and M.Mekala, “A Review on Image Encryption Techniques”, National Conference on “Recent Developments and Applications in Computer Science”, 152, 2016, ISBN : 978-93-82570-73-8.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Blowfish Encryption Decryption Secret key