CFP last date
22 April 2024
Reseach Article

Design and Implementation of a Lock-Key Image Encryption and Decryption, based on a User Provided Password

by Harinandan Tunga, Akash Ghosh, Arnab Saha, Swashata Ghosh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 85 - Number 11
Year of Publication: 2014
Authors: Harinandan Tunga, Akash Ghosh, Arnab Saha, Swashata Ghosh
10.5120/14887-3322

Harinandan Tunga, Akash Ghosh, Arnab Saha, Swashata Ghosh . Design and Implementation of a Lock-Key Image Encryption and Decryption, based on a User Provided Password. International Journal of Computer Applications. 85, 11 ( January 2014), 28-32. DOI=10.5120/14887-3322

@article{ 10.5120/14887-3322,
author = { Harinandan Tunga, Akash Ghosh, Arnab Saha, Swashata Ghosh },
title = { Design and Implementation of a Lock-Key Image Encryption and Decryption, based on a User Provided Password },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 85 },
number = { 11 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume85/number11/14887-3322/ },
doi = { 10.5120/14887-3322 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:02:11.397141+05:30
%A Harinandan Tunga
%A Akash Ghosh
%A Arnab Saha
%A Swashata Ghosh
%T Design and Implementation of a Lock-Key Image Encryption and Decryption, based on a User Provided Password
%J International Journal of Computer Applications
%@ 0975-8887
%V 85
%N 11
%P 28-32
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper is about encryption and decryption of images using a secret password provided by the user. The encryption machine takes the password and the source image as input and generates a key pattern image by using Secure Hash Algorithm (SHA) and a lock image by using Mcrypt algorithm. It provides additional security using Image scrambling. The decryption machine takes the lock image, key image and the password as input to generate the original image. It also checks if the input is valid and blocks the user when an invalid input is provided. In this paper the results are obtained by simulating the entire algorithm in PHP. You can check out the project by visiting www. imglockkey. com.

References
  1. Image encryption and decryption using blowfish algorithm by Irfan Landge, Burhanuddin Contractor, Aamna Patel and Rozina Choudhary.
  2. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping by Musheer Ahmad and M. Shamsher Alam.
  3. Atul, Kahate, Cryptography and Network Security, (Second Edition 2008).
  4. Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, (Second edition, 1996). B. Simpson, et al, "Title of paper goes here if known," unpublished.
  5. Dr. V Ramaswamy, Krishnamurthy G N, "Performance Analysis of Blowfish and its Modified Version using Encryption quality, Key sensitivity", International Journal of Recent Trends in Engineering, Vol. 1, No. 2, May 2009, pp. 1-4.
  6. H. Cheng, X. B. Li, "Partial encryption of compressed image and videos", IEEE Trans. Signal Process. 2008 48(8), pp. 2439-2451.
  7. Irfan Abdulgani Landge, Implementation of AES Encryption & Decryption using VHDL, International J. of Engg. Research & Indu. Appls. (IJERIA). ISSN 0974-1518, Vol. 4, August 2011, pp. 395-406.
  8. "Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme", by Harinandan Tunga, and Soumen Mukherjee, IJCSI Vol. 9 Issue 3, No 1, May 2012, ISSN (Online): 1694-0814. www. ijcsi. org.
Index Terms

Computer Science
Information Sciences

Keywords

Mcript SHA MCRYPT_RIJNDAEL_256 SHA- 256 Lock-Key Algorithm Image Scrambling