Abstract

Securing Images through Cipher Design for Cryptographic Applications

Highlights

  • In the current scenario security of data is the main issue to maintain confidentiality as well as privacy

  • Image encryption converts the original images into unrecognizable images, Medical images, military services as well as its affair application, e-commerce, telecommunication, and many applications that gains the prominence of image encryption

  • In the encoding and decoding technique for cipher, the treatment block is by splitting (32*32) bytes of segmented grayscale, for which its definite pixel value with the intensity of 256 levels (1byte). In this algorithm P is a plaintext image is to be defined by (32*32) byte, whereas cipher image C is denoted by (32*32) byte, Latin Square is denoted by L (32 bytes), and the encoding key is denoted by K (32 bytes) encoding key

Read more

Summary

INTRODUCTION

In the current scenario security of data is the main issue to maintain confidentiality as well as privacy. The main solicitations of this image encryption are many, some of them are military application, medical images, communication via the internet and many more In this electronic era, cryptography is applied to provide various types of security to different electronic devices [1]. An intelligent technology that can protect the information from unauthorized person to hack or decode, that the data is immune to attack This will implicate various techniques such as decipherment in symmetric and asymmetric keys [3] [20]. This process uses the decryption and encryption of data that is equivalent to electronic locking of knowledge [4] This technique uses a private or secret key that can be shared only with receive for decoding as well as encoding the information.

BACKGROUND
The Objective of the Work
METHODOLOGY
Latin Square
Latin Square Image Cipher
Latin Square Whitening
Latin Square Substitution
Encryption and Decryption for 8 Round Grayscale Image
Encryption and Decryption for 4 Round Grayscale Image
Latin Square Permutation
Latin Cube Color Image Cipher block- Encryption and Decryption
Key Change Analysis
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call