Image Encryption by Using Block-Based Symmetric Transformation Algorithm (International Data Encryption Algorithm)

被引:2
作者
Upadhyay, Sandeep [1 ]
Dave, Drashti [2 ]
Sharma, Gourav [3 ]
机构
[1] Techno India NJR Inst Technol, Dept Comp Sci & Engn, Udaipur, India
[2] Cent Univ Rajasthan, Dept Comp Sci & Engn, Ajmer, India
[3] Regen Powertech Pvt Ltd, Informat & Syst Dept, Udaipur 313001, Rajasthan, India
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1 | 2016年 / 408卷
关键词
Plaintext; Ciphertext; Subkey; Expansion; Bit; Rotation; Pixel; Round; Dummy zero;
D O I
10.1007/978-981-10-0129-1_56
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today's world of communication is using image for message exchange also, may be one of the reason is that, text-based data is not that much secure until and unless we perform a good level of confusion-and diffusion-based encryption. In the case of image, security of image is a serious issue now-a-days because of ever increasing multimedia development, use, and associated brute force attacks. In the proposed paper, we are using IDEA (International Data Encryption Algorithm) as one of the strongest secret-key block ciphers by describing how IDEA can be used for image encryption before modifying the plaintext. The block cipher IDEA operates on 64-bit plaintext blocks, uses 128-bit key to give 64-bit cipher text blocks. We have used the pixel values of image to be encrypted. The proposed method consists of following five stages 1. Getting the pixel values of an image in two-dimensional plane. 2. Expending the 24-bit value of each pixel in 64-bit representation. 3. Applying IDEA algorithm over the 64-bit plaintext. 4. Adding eight bits at RHS to the generated 64-bit ciphertext in 24-bit. 5. Reallocating the color value from that 72-bit resultant in three pixel values.
引用
收藏
页码:531 / 539
页数:9
相关论文
共 5 条
[1]  
Jani H. M., 2013, INT J SCI RES IJSR I, V2
[2]  
Kahate Atul, CRYPTOGRAPHY NETWORK
[3]  
Pakshwar Rinki, 2013, INT J COMPUTER SCI I, V4
[4]  
Sharma K. D., 2012, INT J ADV RES COMPUT, V2
[5]  
Stallings William., 2005, CRYPTOGRAPHY NETWORK, VFourth