CFP last date
22 April 2024
Reseach Article

Image Encryption using Multiple Advanced Block Cipher Techniques

by Pooja Prashar, Shivanku Mahna
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 2
Year of Publication: 2017
Authors: Pooja Prashar, Shivanku Mahna
10.5120/ijca2017915473

Pooja Prashar, Shivanku Mahna . Image Encryption using Multiple Advanced Block Cipher Techniques. International Journal of Computer Applications. 175, 2 ( Oct 2017), 1-4. DOI=10.5120/ijca2017915473

@article{ 10.5120/ijca2017915473,
author = { Pooja Prashar, Shivanku Mahna },
title = { Image Encryption using Multiple Advanced Block Cipher Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 175 },
number = { 2 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number2/28457-2017915473/ },
doi = { 10.5120/ijca2017915473 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:23:57.372676+05:30
%A Pooja Prashar
%A Shivanku Mahna
%T Image Encryption using Multiple Advanced Block Cipher Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 2
%P 1-4
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The technology dependent world we live in is producing information in abundance at an unparallel rate, so much so that it is extremely hard for us to keep the information secured and risk free anymore. With every passing day, the means and methods of breaking in being used by hackers are advancing and hence, there is an urgent need to upgrade the security systems currently in place and protect our data. In order to avoid the threats and risks of vital data to a certain point, several encryption algorithms have been used or have evolved over the recent time. Through this paper, we are proposing a digital image encryption technique, which can increase the security of a digital image by many folds with the help of using a combination of DES algorithm and elliptic curve cryptosystem. As a result of this, we made the data to be more secure and were able to retain the confidentiality and privacy much better as compared to using only a vanilla flavor of DES algorithm. Also the fact that the key being used in DES algorithm is being generated using a chaotic key generator, which is being guided with the help of Henon map, makes a big difference in the performance side of the things of the algorithm.

References
  1. Mark Stamp and Richard M. Low, “Applied Cryptanalysis: Breaking Ciphers in the Real World”, Wiley-IEEE Press, 2007.
  2. Ramesh Kumar Yadava, Dr. B. K.Singh, S. K. Sinha and K. K. Pandey, “A New Approach of Colour Image Encryption Based on Henon like Chaotic Map”, Journal of Information Engineering and Applications, vol. 3, no. 6, , pp. 14-20, 2013.
  3. Seung-Jo Han, Heang-Soo Oh and Jongan Park, “The improved data encryption standard (DES) algorithm”, 1996 IEEE 4th International Symposium on Spread Spectrum Techniques and Applications Proceedings.
  4. Moncef Amara and Amar Siad, “Elliptic Curve Cryptography and its applications”, International Workshop on Systems, Signal Processing and their Applications, WOSSPA, IEEE Xplore, 2011.
  5. Xianjin Fang and Yanting Wu, “Investigation into the elliptic curve cryptography”, 2017, 3rd International Conference on Information Management (ICIM).
  6. Mohamed A. Seif Eldeen,Abdellatif A. Elkouny and Salwa Elramly, "DES algorithm security fortification using Elliptic Curve Cryptography",2015, Tenth International Conference on Computer Engineering & Systems (ICCES).
  7. Žarko S. Stanisavljević, "Data encryption standard visual representation", 2015, 23rd Telecommunications Forum Telfor (TELFOR).
Index Terms

Computer Science
Information Sciences

Keywords

DES ECG.