CFP last date
22 April 2024
Reseach Article

An Enhancement of Security on Image Applying Asymmetric Key Algorithm

by Sabyasachi Samanta, Saurabh Dutta, Gautam Sanyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 25 - Number 5
Year of Publication: 2011
Authors: Sabyasachi Samanta, Saurabh Dutta, Gautam Sanyal
10.5120/3029-4105

Sabyasachi Samanta, Saurabh Dutta, Gautam Sanyal . An Enhancement of Security on Image Applying Asymmetric Key Algorithm. International Journal of Computer Applications. 25, 5 ( July 2011), 19-23. DOI=10.5120/3029-4105

@article{ 10.5120/3029-4105,
author = { Sabyasachi Samanta, Saurabh Dutta, Gautam Sanyal },
title = { An Enhancement of Security on Image Applying Asymmetric Key Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 25 },
number = { 5 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume25/number5/3029-4105/ },
doi = { 10.5120/3029-4105 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:10:57.459884+05:30
%A Sabyasachi Samanta
%A Saurabh Dutta
%A Gautam Sanyal
%T An Enhancement of Security on Image Applying Asymmetric Key Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 25
%N 5
%P 19-23
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Every characters of textual message are encrypted through the encryption key of RSA algorithm and then to an array of data bits. After that the data bits are embedded to some suitable nonlinear pixel and bit positions about the entire image through system modulus of RSA algorithm. As a result, we get a watermarked image. After that we have formed three different image shares using any two components of R, G and B of entire watermarked image. At the decryption end, three key shares are assigned for each and every share. The system modulus and private key are calculated from the prime factors of key shares. The embedded data bits are being retrieved from watermarked image by the system modulus and decrypted to the corresponding characters by the key, finally to its original content.

References
  1. Sabyasachi Samanta, Saurabh Dutta, “Implementation of Invisible Digital Watermarking on Image Nonlinearly of Arithmetically Compressed Data” in ‘IJCSNS International Journal of Computer Science and Network Security, Journal ISSN: 1738- 7906 Vol.10 No.4, April 2010 pp.261-266.
  2. Sabyasachi Samanta, Saurabh Dutta, “Implementation of Invisible Digital Watermarking on Image Nonlinearly Encrypted with Galois Field (GF- 256)” in “2010 International Conference on Informatics, Cybernetics, and Computer Applications (ICICCA2010)” July 19-21, 2010, pp. 26-30.
  3. Sabyasachi Samanta, Saurabh Dutta, “Implementation of Invisible Digital Watermarking on Image using Permutation of Keys and Image Shares” Special issue of IJCCT, ISSN:0975-7449, Vol. 2, Issue 2, 3, 4; 2010, “International Conference [ICCT-2010]“, December 3 – 5, pp. 125-129.
  4. Sabyasachi Samanta, Saurabh Dutta, “Implementation of Invisible Digital Watermarking on Image using Nonlinear Function”, “International Conference on Computer Applications, 2010 (ICCA2010)”, December 24-27, 2010, pp.189-195
  5. Sabyasachi Samanta, Saurabh Dutta, “Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed Data into Image using Variable-Length Key”, “The Second International Conference on Network & Communications Security “, January 2-4, 2011, pp. 523-534
  6. Sabyasachi Samanta, Saurabh Dutta, Goutam Sanyal, “An Enhancement of Security of Image using Permutation of RGB-Components”, “3rd International Conference on Conference on Electronics Computer Technology ”, 8-10 April, 2011, pp. v2-404-v2-408
  7. Sabyasachi Samanta, Saurabh Dutta, Goutam Sanyal, ”Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed Data into Image using Variable-Length Key”, “International Journal of Network Security & Its Applications (IJNSA)” Vol. 3, No. 2, 2011, pp.30-41
  8. J. M. BlackLedge, M. L. Hallot, “Convert Encryption and Document Authentication using Texture Coding”, “i-managers Journal of Software Engineering”, Vol. 3, No. 1, July- September 2008
  9. Atul Kahate, “Cryptography and Network Security”, 2nd Edition, THM, New Delhi.
Index Terms

Computer Science
Information Sciences

Keywords

Pixel invisible digital watermarking RSA Algorithm nonlinear function