SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
85 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
A Cryptographic Key Generation Using
2D Graphics pixel Shuffling
Londhe Swapnali1
| Jagtap Megha2
| Shinde Ranjeet3
| Belsare4
1Department of Computer Engineering, S.B Patil College, Indapur, India
2Department of Computer Engineering, S.B Patil College, Indapur, India
3Department of Computer Engineering, S.B Patil College, Indapur, India
4Department of Computer Engineering, S.B Patil College, Indapur, India
Now a day with incredible change in social media network like mobile communication and computer, all
type of a data such as audio, video, images are used for the communication .Privacy for that data is an
important issue .Cryptography is one of the technique used for stopping unauthorized access and increasing
integrity of that data. In research area encryption and decryption scheme is used based on image pixel
shuffling and transposition. For security purpose we can use cipher algorithm for generating key using RGB
values of the pixel instead of using only pixel values. For that purpose in our proposed system we are using
m*n size image on which different operations can be performed. Our proposed system is more secure as
compare to existing system.
KEYWORDS: Cryptography, Encryption, Decryption, Cipher text, Pixel, 2D graphics image, Integrity, key
Network.
Copyright © 2015 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
We cannot think about the world without
communication .Now a day’s hiding of data from
unauthorized person is an important task .There
are many online services present in which
communication takes place through social media
network. In that case there is high probability of
hacking [1].Integrity of a data is not maintained
well.
Different techniques are used to maintain a
security in all social networks communication. The
techniques such as cryptography and stenography.
Cryptography is the best technique to increase the
security between communications. It’s applied on a
different type of data such as text, image, video etc.
In cryptography two different processes are there,
first is encryption in which specific key is used to
encrypt the data. It is a process of converting plain
text in to cipher text and second is decryption in
which cipher text is converting into plain text. Two
things are important for performing encryption and
decryption, first is algorithm and second is key.
Plain text is combined with the algorithm to form a
key. This generated key is then used for the
encryption process .This cipher text is applied to
the algorithm for generating the plain text.
Symmetric and asymmetric are the two approaches
of encryption .In symmetric same cryptographic
key is used for encryption and decryption but in
decryption different key’s are used for processing.
In this approach keys are identical or combination
of different keys.
Image is made up of different color pixels. Every
pixel having different colors at a single point, so
pixel is a single color dot. Digital approximation
can be resulted from that color dot using this
values reconstruction of that image take place.
Digital image having two types first is color image
made up of color pixels. Color pixel holds primary
colors such as red, blue and green. This values
proportion used for creating secondary colors. If
each primary contain the 256 levels then four byte
memory required for each. Bi-level image having
single bit to represent each pixel. It’s having only
two states with color black and white [2].
In this paper we focused on key part. In image
based cryptographic technique, cipher algorithm of
ABSTRACT
86 International Journal for Modern Trends in Science and Technology
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
m*n size image used for fetching RGB pixel values.
Encryption and decryption of an m*n size image is
based on the RGB pixel values. Property of 2D
graphics image is only viewing and listing image
dimensions is sometimes impossible for generating
the image.
Rest of the paper is organized as, 2nd section is
related to related work. 3rd section gives
information related to proposed system, 4th section
represent the advantages, 5th section proposes
experimental work with some mathematical
part.6th section provides the overall summary of
our paper with conclusion of the paper.
II. PROPOSED SYSTEM
In previous existing system key generation is
take place using the pixel values of the 2D graphics
image. In which proposed algorithm used for
extracting the pixel values as well as creating the
key from pixel [1]. For increasing the security of
image during the communication and
transmission we propose new techniques. In last
module we use RSA algorithm for encryption and
same key is used for decryption process of 2D
graphics image [2].
In this paper user having freedom to generate
any type of pattern signature etc. having fixed size
of design pattern .Any image is made up of using
different colors pixels. Each pixel having three
components ass RGB . This RGB values first of all
extracted and after shuffling we get cipher image.
It’s done only by using a RGB values[2].
In this method we not use the bit values of pixel
as well as pixel expansion at the end of the
encryption and decryption process. Pixel having
numeric values which interchanged or the RGB
values displaced from their original position to
create a cipher text. When we add all values in
between image no change take place in original size
and shape in image. All the features of an image
remain unchanged during the process of
encryption and decryption [2].
Figure.1 describes the architecture of encryption
and decryption. We provides user interface for
designing the pattern .According to cipher
algorithm we fetch the all RGB values and
manipulation take place using reshuffling
,transposition techniques for generating key.
Image decomposed into three components which
act upon the cipher algorithm. That components
form the all features and characteristics of original
image. Within image boundaries all the RGB values
are shuffled and interchanged, created array is
different for all components.
Figure 1:- Encryption and decryption of image
III. FLOW OF PROJECT
Figure.2 describes the flow of encryption and
decryption process. In which first of all we accept
the image, fetch all the RGB components using
cipher algorithm and convert plain text in to cipher
text. We use RSA algorithm for the encryption
process. In which key is combined with cipher text
for performing encryption process. Decryption
process take place by importing all data and using
reveres process of encryption. This process is done
for generating original image with its shape and
size.
Figure 2: The flow chart diagram for the encryption and
decryption process.
87 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST
IV. PROPOSED ALGORITHM
1. Read the user created Graphical image.
2. Read the pixels and shuffle among them
there position (i.e. exchange the 1st pixel
value with the last position pixel value, 2nd
pixel value with the second last position
pixel value and soon until we reached to the
centre pixel value).
3. Create a group of pixels (i.e. 64 bits).
4. Shuffle the groups among their position (i.e.
exchange the 1st position group with the
last position group, 2nd position group with
the second last position group and soon
until we reached to the center position).
5. Initiate i=1
6. Declare array to store key in array Result
[16].
7. Declare two variables var1 and var2.
8. Store the 1st group value in var1 and 2nd
group value in var2.
9. While i < size of array
a. Perform the XOR operation between var1
and var2.
b. Store the result of XOR operation in ith
block of array.
c. Store the value of result obtained in var1
and next group value into var2.
d. Increment the value of variable i and go to
step
10. Results obtained from Step9 are applied in
each phase of DES algorithm as
independent sub-keys.
V. RESULTS AND DISCUSSION
In the fig 3, it shows the key generation using
given input image. Input we can fetch from
anywhere after that using DES algorithm we
generate a key.
Fig. 3 Key generation Process
Fig. 4 Encrypted text insertion and mail sending
In the fig 4, which text we have to encrypt its
inserted .In initial stage we insert only 16
characters for encryption purpose. After that
cipher text and generated key sended on receiver
mail for decryption purpose for getting original
text.
VI. CONCLUSION
In this paper we have proposed cryptographic
key generation on a 2D graphics using RGB pixel
shuffling & transposition. For our proposed system
we use any size of image as an input. Small change
in image creates a number of keys. In proposed
system at each stage cipher algorithm generates
different keys using the RGB pixel values on which
different operations are performed. Existing system
uses pixel values only but our proposed system
extracts RGB pixel values of given image. This will
be helpful for increasing security of given 2D
graphics image. In future we can combines
different RGB values of pixel with each other and
generate a new pattern for key.
REFERENCES
[1] Pratik Shrivastava, Reteshjain, K.S. RaghuWanshi,
A modified. Approach of key manipulation in
cryptography using 2D graphics Image, Published in
Proceeding ICESC '14 Proceedings of the 2014
International Conference on Electronic Systems,
Signal Processing and Computing Technologies
Pages 194-197, IEEE Computer Society Washington,
DC, USA ©2014.
[2] Xiukum Li, Xianggian Wu*, Ning Qi,
KuanquanWang. A novel cryptographic Algorithm
based on iris feature, 2008.
88 International Journal for Modern Trends in Science and Technology
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
[3] ShujiangXu, YinglongWang, YucuiGuo, Cong Wang,
"A Novel Image Encryption Scheme based on a
Nonlinear Chaotic Map", IJIGSP, vol.2, no.1,
pp.61-68, 2010.
[4] Krishnan, G.S.; Loganathan, D.; , "Color image
cryptography scheme based on visual cryptography,"
Signal Processing, Communication, Computing and
Networking Technologies (ICSCCN), 2011
International Conference on , vol., no., pp.404-407,
21-22 July 2011.
[5] Christy, J.I.; Seenivasagam, V. , "Construction of
color Extended Visual Cryptographic scheme using
Back Propagation Network for color images,"
Computing, Electronics and Electrical Technologies
(ICCEET), 2012 International Conference on , vol.,
no., pp.1101-1108, 21-22 March 2011.
[6] B. Santhi, K.S. Ravichandran, A.P. Arun and L.
Chakkarapani Novel Cryptographic Key Generation
Method Using Image Features, 2012.
[7] Kester, Quist-Aphetsi; , "A public-key exchange
cryptographic technique using matrix," Adaptive
Science & Technology (ICAST), 2012 IEEE 4th
International Conference on , vol., no., pp.78-81,
25-27 Oct. 2012.
[8] RuisongYe, WeiZhou,"A Chaos-based Image
Encryption Scheme Using 3D Skew Tent Map and
Coupled Map Lattice", IJCNIS, vol.4, no.1, pp.38-44,
2012.
[9] Asia mahdiNaserAlzubaid, Cotor Image
Encryption & decryption using pixel shuffling with
Henon chaotic syste, 2014.
[10]AmneshGoel, NidhiChandra,"A Technique for Image
Encryption with Combination of Pixel
Rearrangement Scheme Based On Sorting Group
Wise Of RGB Values and Explosive Inter-Pixel
Displacement", IJIGSP, vol.4, no.2, pp.16-22, 2012.
[11] Panchami V, Varghes Amithab Wahi, A New Color
ORIENTED Cryptographic Algorithm Based on
Unicode And RGB Color Model, 2014.

Weitere ähnliche Inhalte

Was ist angesagt?

Image encryption
Image encryptionImage encryption
Image encryption
rakshit2105
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
AM Publications
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 

Was ist angesagt? (18)

DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
Image encryption
Image encryptionImage encryption
Image encryption
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
 

Andere mochten auch

Smart Millennials and their Changing Shopping Trends: A Case of Millennial St...
Smart Millennials and their Changing Shopping Trends: A Case of Millennial St...Smart Millennials and their Changing Shopping Trends: A Case of Millennial St...
Smart Millennials and their Changing Shopping Trends: A Case of Millennial St...
IJMTST Journal
 
Adaptive Variable Speed Control Scheme for Wind Based on PFC of BLDC Drive Ap...
Adaptive Variable Speed Control Scheme for Wind Based on PFC of BLDC Drive Ap...Adaptive Variable Speed Control Scheme for Wind Based on PFC of BLDC Drive Ap...
Adaptive Variable Speed Control Scheme for Wind Based on PFC of BLDC Drive Ap...
IJMTST Journal
 
Modelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaModelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for Nigeria
IJMTST Journal
 
Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...
Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...
Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...
IJMTST Journal
 
Analysis of 7-Level Cascaded & MLDCLI with Sinusoidal PWM & Modified Referenc...
Analysis of 7-Level Cascaded & MLDCLI with Sinusoidal PWM & Modified Referenc...Analysis of 7-Level Cascaded & MLDCLI with Sinusoidal PWM & Modified Referenc...
Analysis of 7-Level Cascaded & MLDCLI with Sinusoidal PWM & Modified Referenc...
IJMTST Journal
 
Adaptive Control Scheme for PV Based Induction Machine
Adaptive Control Scheme for PV Based Induction MachineAdaptive Control Scheme for PV Based Induction Machine
Adaptive Control Scheme for PV Based Induction Machine
IJMTST Journal
 

Andere mochten auch (16)

STATCOM Based Wind Energy System by using Hybrid Fuzzy Logic Controller
STATCOM Based Wind Energy System by using Hybrid Fuzzy Logic ControllerSTATCOM Based Wind Energy System by using Hybrid Fuzzy Logic Controller
STATCOM Based Wind Energy System by using Hybrid Fuzzy Logic Controller
 
Modeling and Simulation of Cascaded Multilevel Inverter fed PMSM Drive with P...
Modeling and Simulation of Cascaded Multilevel Inverter fed PMSM Drive with P...Modeling and Simulation of Cascaded Multilevel Inverter fed PMSM Drive with P...
Modeling and Simulation of Cascaded Multilevel Inverter fed PMSM Drive with P...
 
Smart Millennials and their Changing Shopping Trends: A Case of Millennial St...
Smart Millennials and their Changing Shopping Trends: A Case of Millennial St...Smart Millennials and their Changing Shopping Trends: A Case of Millennial St...
Smart Millennials and their Changing Shopping Trends: A Case of Millennial St...
 
Improving Code Compression Efficiency of MIPS32 Processor using Modified ISA
Improving Code Compression Efficiency of MIPS32 Processor using Modified ISAImproving Code Compression Efficiency of MIPS32 Processor using Modified ISA
Improving Code Compression Efficiency of MIPS32 Processor using Modified ISA
 
Design and implementation of Closed Loop Control of Three Phase Interleaved P...
Design and implementation of Closed Loop Control of Three Phase Interleaved P...Design and implementation of Closed Loop Control of Three Phase Interleaved P...
Design and implementation of Closed Loop Control of Three Phase Interleaved P...
 
Hybrid Power Quality Compensator for Traction Power System with Photovoltaic ...
Hybrid Power Quality Compensator for Traction Power System with Photovoltaic ...Hybrid Power Quality Compensator for Traction Power System with Photovoltaic ...
Hybrid Power Quality Compensator for Traction Power System with Photovoltaic ...
 
An Improved UPQC Controller to Provide Grid-Voltage Regulation
An Improved UPQC Controller to Provide Grid-Voltage RegulationAn Improved UPQC Controller to Provide Grid-Voltage Regulation
An Improved UPQC Controller to Provide Grid-Voltage Regulation
 
Adaptive Variable Speed Control Scheme for Wind Based on PFC of BLDC Drive Ap...
Adaptive Variable Speed Control Scheme for Wind Based on PFC of BLDC Drive Ap...Adaptive Variable Speed Control Scheme for Wind Based on PFC of BLDC Drive Ap...
Adaptive Variable Speed Control Scheme for Wind Based on PFC of BLDC Drive Ap...
 
L-Z Source Based 11 Level Diode-Clamped Multi Level Inverter
L-Z Source Based 11 Level Diode-Clamped Multi Level InverterL-Z Source Based 11 Level Diode-Clamped Multi Level Inverter
L-Z Source Based 11 Level Diode-Clamped Multi Level Inverter
 
Control Scheme for an IPM Synchronous Generator Based-Variable Speed Wind Tur...
Control Scheme for an IPM Synchronous Generator Based-Variable Speed Wind Tur...Control Scheme for an IPM Synchronous Generator Based-Variable Speed Wind Tur...
Control Scheme for an IPM Synchronous Generator Based-Variable Speed Wind Tur...
 
Modelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for NigeriaModelling Determinants of Software Development Outsourcing for Nigeria
Modelling Determinants of Software Development Outsourcing for Nigeria
 
Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...
Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...
Serial Peripheral Interface Design for Advanced Microcontroller Bus Architect...
 
Analysis of 7-Level Cascaded & MLDCLI with Sinusoidal PWM & Modified Referenc...
Analysis of 7-Level Cascaded & MLDCLI with Sinusoidal PWM & Modified Referenc...Analysis of 7-Level Cascaded & MLDCLI with Sinusoidal PWM & Modified Referenc...
Analysis of 7-Level Cascaded & MLDCLI with Sinusoidal PWM & Modified Referenc...
 
Adaptive Control Scheme for PV Based Induction Machine
Adaptive Control Scheme for PV Based Induction MachineAdaptive Control Scheme for PV Based Induction Machine
Adaptive Control Scheme for PV Based Induction Machine
 
Experimental Study on use of Crushed Rock Powder as Partial Replacement for F...
Experimental Study on use of Crushed Rock Powder as Partial Replacement for F...Experimental Study on use of Crushed Rock Powder as Partial Replacement for F...
Experimental Study on use of Crushed Rock Powder as Partial Replacement for F...
 
Graph Tea: Simulating Tool for Graph Theory & Algorithms
Graph Tea: Simulating Tool for Graph Theory & AlgorithmsGraph Tea: Simulating Tool for Graph Theory & Algorithms
Graph Tea: Simulating Tool for Graph Theory & Algorithms
 

Ähnlich wie A Cryptographic Key Generation Using 2D Graphics pixel Shuffling

11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
Alexander Decker
 

Ähnlich wie A Cryptographic Key Generation Using 2D Graphics pixel Shuffling (20)

B017640811
B017640811B017640811
B017640811
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing Images
 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography           Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 

Kürzlich hochgeladen

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 

Kürzlich hochgeladen (20)

Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 

A Cryptographic Key Generation Using 2D Graphics pixel Shuffling

  • 1. 85 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST A Cryptographic Key Generation Using 2D Graphics pixel Shuffling Londhe Swapnali1 | Jagtap Megha2 | Shinde Ranjeet3 | Belsare4 1Department of Computer Engineering, S.B Patil College, Indapur, India 2Department of Computer Engineering, S.B Patil College, Indapur, India 3Department of Computer Engineering, S.B Patil College, Indapur, India 4Department of Computer Engineering, S.B Patil College, Indapur, India Now a day with incredible change in social media network like mobile communication and computer, all type of a data such as audio, video, images are used for the communication .Privacy for that data is an important issue .Cryptography is one of the technique used for stopping unauthorized access and increasing integrity of that data. In research area encryption and decryption scheme is used based on image pixel shuffling and transposition. For security purpose we can use cipher algorithm for generating key using RGB values of the pixel instead of using only pixel values. For that purpose in our proposed system we are using m*n size image on which different operations can be performed. Our proposed system is more secure as compare to existing system. KEYWORDS: Cryptography, Encryption, Decryption, Cipher text, Pixel, 2D graphics image, Integrity, key Network. Copyright © 2015 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION We cannot think about the world without communication .Now a day’s hiding of data from unauthorized person is an important task .There are many online services present in which communication takes place through social media network. In that case there is high probability of hacking [1].Integrity of a data is not maintained well. Different techniques are used to maintain a security in all social networks communication. The techniques such as cryptography and stenography. Cryptography is the best technique to increase the security between communications. It’s applied on a different type of data such as text, image, video etc. In cryptography two different processes are there, first is encryption in which specific key is used to encrypt the data. It is a process of converting plain text in to cipher text and second is decryption in which cipher text is converting into plain text. Two things are important for performing encryption and decryption, first is algorithm and second is key. Plain text is combined with the algorithm to form a key. This generated key is then used for the encryption process .This cipher text is applied to the algorithm for generating the plain text. Symmetric and asymmetric are the two approaches of encryption .In symmetric same cryptographic key is used for encryption and decryption but in decryption different key’s are used for processing. In this approach keys are identical or combination of different keys. Image is made up of different color pixels. Every pixel having different colors at a single point, so pixel is a single color dot. Digital approximation can be resulted from that color dot using this values reconstruction of that image take place. Digital image having two types first is color image made up of color pixels. Color pixel holds primary colors such as red, blue and green. This values proportion used for creating secondary colors. If each primary contain the 256 levels then four byte memory required for each. Bi-level image having single bit to represent each pixel. It’s having only two states with color black and white [2]. In this paper we focused on key part. In image based cryptographic technique, cipher algorithm of ABSTRACT
  • 2. 86 International Journal for Modern Trends in Science and Technology A Cryptographic Key Generation Using 2D Graphics pixel Shuffling m*n size image used for fetching RGB pixel values. Encryption and decryption of an m*n size image is based on the RGB pixel values. Property of 2D graphics image is only viewing and listing image dimensions is sometimes impossible for generating the image. Rest of the paper is organized as, 2nd section is related to related work. 3rd section gives information related to proposed system, 4th section represent the advantages, 5th section proposes experimental work with some mathematical part.6th section provides the overall summary of our paper with conclusion of the paper. II. PROPOSED SYSTEM In previous existing system key generation is take place using the pixel values of the 2D graphics image. In which proposed algorithm used for extracting the pixel values as well as creating the key from pixel [1]. For increasing the security of image during the communication and transmission we propose new techniques. In last module we use RSA algorithm for encryption and same key is used for decryption process of 2D graphics image [2]. In this paper user having freedom to generate any type of pattern signature etc. having fixed size of design pattern .Any image is made up of using different colors pixels. Each pixel having three components ass RGB . This RGB values first of all extracted and after shuffling we get cipher image. It’s done only by using a RGB values[2]. In this method we not use the bit values of pixel as well as pixel expansion at the end of the encryption and decryption process. Pixel having numeric values which interchanged or the RGB values displaced from their original position to create a cipher text. When we add all values in between image no change take place in original size and shape in image. All the features of an image remain unchanged during the process of encryption and decryption [2]. Figure.1 describes the architecture of encryption and decryption. We provides user interface for designing the pattern .According to cipher algorithm we fetch the all RGB values and manipulation take place using reshuffling ,transposition techniques for generating key. Image decomposed into three components which act upon the cipher algorithm. That components form the all features and characteristics of original image. Within image boundaries all the RGB values are shuffled and interchanged, created array is different for all components. Figure 1:- Encryption and decryption of image III. FLOW OF PROJECT Figure.2 describes the flow of encryption and decryption process. In which first of all we accept the image, fetch all the RGB components using cipher algorithm and convert plain text in to cipher text. We use RSA algorithm for the encryption process. In which key is combined with cipher text for performing encryption process. Decryption process take place by importing all data and using reveres process of encryption. This process is done for generating original image with its shape and size. Figure 2: The flow chart diagram for the encryption and decryption process.
  • 3. 87 International Journal for Modern Trends in Science and Technology Volume: 2 | Issue: 05 | May 2016 | ISSN: 2455-3778IJMTST IV. PROPOSED ALGORITHM 1. Read the user created Graphical image. 2. Read the pixels and shuffle among them there position (i.e. exchange the 1st pixel value with the last position pixel value, 2nd pixel value with the second last position pixel value and soon until we reached to the centre pixel value). 3. Create a group of pixels (i.e. 64 bits). 4. Shuffle the groups among their position (i.e. exchange the 1st position group with the last position group, 2nd position group with the second last position group and soon until we reached to the center position). 5. Initiate i=1 6. Declare array to store key in array Result [16]. 7. Declare two variables var1 and var2. 8. Store the 1st group value in var1 and 2nd group value in var2. 9. While i < size of array a. Perform the XOR operation between var1 and var2. b. Store the result of XOR operation in ith block of array. c. Store the value of result obtained in var1 and next group value into var2. d. Increment the value of variable i and go to step 10. Results obtained from Step9 are applied in each phase of DES algorithm as independent sub-keys. V. RESULTS AND DISCUSSION In the fig 3, it shows the key generation using given input image. Input we can fetch from anywhere after that using DES algorithm we generate a key. Fig. 3 Key generation Process Fig. 4 Encrypted text insertion and mail sending In the fig 4, which text we have to encrypt its inserted .In initial stage we insert only 16 characters for encryption purpose. After that cipher text and generated key sended on receiver mail for decryption purpose for getting original text. VI. CONCLUSION In this paper we have proposed cryptographic key generation on a 2D graphics using RGB pixel shuffling & transposition. For our proposed system we use any size of image as an input. Small change in image creates a number of keys. In proposed system at each stage cipher algorithm generates different keys using the RGB pixel values on which different operations are performed. Existing system uses pixel values only but our proposed system extracts RGB pixel values of given image. This will be helpful for increasing security of given 2D graphics image. In future we can combines different RGB values of pixel with each other and generate a new pattern for key. REFERENCES [1] Pratik Shrivastava, Reteshjain, K.S. RaghuWanshi, A modified. Approach of key manipulation in cryptography using 2D graphics Image, Published in Proceeding ICESC '14 Proceedings of the 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies Pages 194-197, IEEE Computer Society Washington, DC, USA ©2014. [2] Xiukum Li, Xianggian Wu*, Ning Qi, KuanquanWang. A novel cryptographic Algorithm based on iris feature, 2008.
  • 4. 88 International Journal for Modern Trends in Science and Technology A Cryptographic Key Generation Using 2D Graphics pixel Shuffling [3] ShujiangXu, YinglongWang, YucuiGuo, Cong Wang, "A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map", IJIGSP, vol.2, no.1, pp.61-68, 2010. [4] Krishnan, G.S.; Loganathan, D.; , "Color image cryptography scheme based on visual cryptography," Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011 International Conference on , vol., no., pp.404-407, 21-22 July 2011. [5] Christy, J.I.; Seenivasagam, V. , "Construction of color Extended Visual Cryptographic scheme using Back Propagation Network for color images," Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on , vol., no., pp.1101-1108, 21-22 March 2011. [6] B. Santhi, K.S. Ravichandran, A.P. Arun and L. Chakkarapani Novel Cryptographic Key Generation Method Using Image Features, 2012. [7] Kester, Quist-Aphetsi; , "A public-key exchange cryptographic technique using matrix," Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference on , vol., no., pp.78-81, 25-27 Oct. 2012. [8] RuisongYe, WeiZhou,"A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice", IJCNIS, vol.4, no.1, pp.38-44, 2012. [9] Asia mahdiNaserAlzubaid, Cotor Image Encryption & decryption using pixel shuffling with Henon chaotic syste, 2014. [10]AmneshGoel, NidhiChandra,"A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based On Sorting Group Wise Of RGB Values and Explosive Inter-Pixel Displacement", IJIGSP, vol.4, no.2, pp.16-22, 2012. [11] Panchami V, Varghes Amithab Wahi, A New Color ORIENTED Cryptographic Algorithm Based on Unicode And RGB Color Model, 2014.