Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Non Path-based Mutual Anonymity Approach with Secure Cipher Text to Image Encryption Message-Peer-to-Peer Systems

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Abdul Majid, Amit Chaturvadi

Abdul Majid and Amit Chaturvadi. Non Path-based Mutual Anonymity Approach with Secure Cipher Text to Image Encryption Message-Peer-to-Peer Systems. International Journal of Computer Applications 161(13):14-18, March 2017. BibTeX

	author = {Abdul Majid and Amit Chaturvadi},
	title = {Non Path-based Mutual Anonymity Approach with Secure Cipher Text to Image Encryption Message-Peer-to-Peer Systems},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {161},
	number = {13},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {14-18},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2017913433},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


In Anonymous peer to peer system regularly incurred extra expenses if wants to do perfect transfer. Last node always tries to copy itself when they receive the information and privacy consideration for the entire user kept in consideration. The transmission of secure data in peer to peer system is major issue in current scenario. To ensure the security in the peer to peer system there are many techniques and algorithm were evolved his cryptograph techniques are most powerful. In the existing models the path based, unstructured with dummy traffic to confuse the attacker. The plain texts convert to cipher text in the existing models. The attackers are easy track the cipher text and this is not secure form. Propose Rumor Riding, a novel approach for nodes in P2P systems with a more secure data, cipher text to Image format which is more secure and protect data from unauthorized users. In this scheme block cipher using substitution method that encrypts the given text into blocks. In this paper, the user given plain text is dividing into blocks that are referred to the AES Rijndael Encryption process, converted to unreadable format. Each and every character of the block shifted into ASCII value and from this ASCII value formulated into equivalent color code. Finally this cipher text which encrypted is become the Image format this give the more enrichment to the data. After become image, now applying Random walk mechanism for lower overhead systems, by using the symmetric cryptographic algorithm. Dummy traffic generation will be used to hide the actual image encrypted data to confuse the attackers and accelerating query speed. Dummy traffic generates traffic in a similar message with Image encrypted format and key to confuse the attacker. Evaluation is done by using anonymity approaches AES Rijndael. show the effective by simulations driven this protocol is very effective and efficient than previous protocols and this is illustrated with the experimental and analytical results.


  1. M.K. Reiter and A.D. Rubin, “Crowds: Anonymity for WebTransactions,” ACM Trans. Information and System Security,vol.1, no. 1, pp. 66-92, Nov. 1998.
  2. L. Xiao, Z. Xu, and X. Zhang, “Low-Cost and Reliable MutualAnonymity Protocols in Peer-to-Peer Networks,” IEEE Trans.
  3. D. Chaum, “Untraceable Electronic Mail Return Addresses, and Digital Pseudonyms,” Comm. ACM, vol. 24, no. 2, pp. 84-90, Feb. 1981.
  4. R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
  5. M.K. Wright, M. Adler, B.N. Levine, and C. Shields, “The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems,” ACM Trans. Information and System Security, vol. 7, no. 4, pp. 489-522, Nov. 2004.
  6. D. Goldschlag, M. Reed, and P. Syverson, “Onion Routing,”Comm. ACM, vol. 42, no. 2, p. 39, 1999.
  7. R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The Second-Generation Onion Router,”Proc. 13th USENIX Security Symp., pp. 303-320, 2004.
  8. V. Scarlata, B.N. , B.N. Levine, and C. Shields, “Responder Anonymity and Anonymous Peer-to-Peer File Sharing,” Proc. IEEE Int’l Conf. Network Protocols (ICNP), pp. 272-280, Nov. 2001.
  9. Q.Lv, P.Cao, E.Cohen, K.Li, and S. Shenker, “Search and Replication in Unstructured Peer-to-Peer Networks,” Proc. 16thACM Int’l Conf. upercomputing, pp. 84-95, 2002.
  10. L.A.Adamic, R.M.Lukose, A.R.Puniyani, and B.A. Huberman, “Search in Power-Law Networks,” Physical Rev. E., vol. 64,p. 046135, 2001.
  11. C.Gkantsidis, M.Mihail, and A.Saberi, “Random Walks in Peer-to-Peer Networks,” Proc. IEEE INFOCOM, 2004.
  12. N. Bisnik and A. Abouzeid, “Modeling and Analysis of Random Walk Search Algorithms in P2P Networks,” Proc. Second in p2p Systems, 2005.
  13. A.Abusukhon, and M. Talib, "A Novel network security algorithm based on Private Key Encryption". In Proceeding of The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec12), 2012.
  14. Ahmad Abusukhon, Mohammad Talib and Maher A. Nabulsi, “Analysing the efficiency of Text to image encryption algorithm” , in International Journal of Advanced Computer Science and Applications, Vol. 3, No. 11, 2012, pp-35 – 38.
  15. Behrouz A. Forouzan, “Cryptography and Network Security”, Tata McGraw-Hill, 2007.
  16. Jawad Ahmad and Fawad Ahmed “Efficiency Analysis and Security Evaluation of Image encryption Schemes”, in International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol:12 No:04.
  17. Komal D.Patel and Sonal Belani,” Image encryption Using Different Techniques:A Review”, in International Journal of Emerging Technology and Advanced engineering, Volume 1, Issue 1, November 2011, pp: 30- 34.
  18. Manoj Kumar, “Cryptography & Network Security”, 3rd, Krishna Prakashan Media (P) Ltd, 2008.
  19. Mohammad Ali Bani Younes and Aman Jantan “Image Encryption Using Block-Based Transformation Algorithm”, inIAENG International Journal of Computer Science, 35, 2008.


Dummy traffic; Query Speed; non path based; random walk; peer-to-peer; Block cipher, Color Substitution, AES Rijndael Algorithm.