Open Access   Article Go Back

Cumulative Image Encryption Approach

R. Das1 , S. Dutta2

  1. Development Officer, Bankura University, Bankura-722155, W.B., India.
  2. Department of Computer Applications, Dr. B. C. Roy Engineering College, Durgapur-713206, WB, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 170-177, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.170177

Online published on May 31, 2018

Copyright © R. Das, S. Dutta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Das, S. Dutta, “Cumulative Image Encryption Approach,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.170-177, 2018.

MLA Style Citation: R. Das, S. Dutta "Cumulative Image Encryption Approach." International Journal of Computer Sciences and Engineering 6.5 (2018): 170-177.

APA Style Citation: R. Das, S. Dutta, (2018). Cumulative Image Encryption Approach. International Journal of Computer Sciences and Engineering, 6(5), 170-177.

BibTex Style Citation:
@article{Das_2018,
author = {R. Das, S. Dutta},
title = {Cumulative Image Encryption Approach},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {170-177},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1958},
doi = {https://doi.org/10.26438/ijcse/v6i5.170177}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.170177}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1958
TI - Cumulative Image Encryption Approach
T2 - International Journal of Computer Sciences and Engineering
AU - R. Das, S. Dutta
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 170-177
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
443 285 downloads 262 downloads
  
  
           

Abstract

Secret sharing scheme divides colour image into user defined N (positive integer) number of shares with different transference where decryption is being carried out by human visual system using at least K (positive integer) number of shares out of N number of shares. In image key encryption technique the user perform user define BWM&AS operation (bit wise masking and alternate sequence) in between two constitutive bits of each pixel of original image and image key. In this combined approach we introduce two level of encryption using secret sharing scheme followed by Image key encryption technique using BWM&AS operation. Firstly, the original image is encrypted using an image key then that encrypted image is being divided into N number of shares where each of the share is again being encrypted by unique image key in encryption end. In decryption end, we retrieve original shares from the encrypted shares using appropriate image key and generate the original encrypted image by taking K number of share out of N. Lastly, we retrieve the original image by performing BWM&AS operation between the original image key and encrypted image. Thus an attempt is made to enhance the security.

Key-Words / Index Term

Secret Sharing, Human Visual System, Image Key Encryption Technique, BWM&AS Operation

References

[1] M. AL-Laham Mohamad, “Encryption-decryption RGB color image using matrix multiplication”, International Journal of Computer Science & Information Technology (IJCSIT), Vol. 7, No 5, October 2015.
[2] Saksham Wason, Piyush Kumar and Shubham Rathi, “Text and image encryption using color image as a key”, International Journal of Innovative Research in Technology (IJIRT), 2014.
[3] R. Das, S. Kulia , S. Dutta , “ An Approach Of Visual Cryptography Scheme For Color Image By Cumulative Encryption Using Image Partitioning, Text Key Encryption, Image Key Encryption & Digital Enveloping”, International Journal of Engineering Research & Technology, Volume 2, Issue 5, PP-1341-1349, 2013 .
[4] A. Bhakta , S. Maity , R. Das , S. Dutta , “An Approach of Visual Cryptography Scheme by Cumulative Image Encryption Technique Using Image-key Encryption, Bit-Sieved Operation and K-N Secret Sharing Scheme.”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), www.ijitee.org (ISSN: 2278-3075, Vol. 3 Issue 1,) ,pp 20-23 June-2013.
[5] S. Kandar, B.C Dhara., “Random sequence based secret sharing of an encrypted color image”, RAIT, 2012, ISM Dhanbad, INDIA.
[6] S.M.M.Karim, Md. S. Rahaman, Md. I. Hossain, “A new approach for LSB based image steganograpgy using secret key,” IEEE Xplore, DOI: 10.1109/ICCITechn.2011.6164800, Bangladesh, March, 2012. [Computer and Information Technology (ICCIT), Bangladesh, 2011].
[7] M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology-Eurocrypt’94, PP- 1–12, 1995.
[8] Ranjan Parekh, “Principles of Multimedia”, Tata McGraw Hill, INDIA, 2006.
[9] J. Fridrich, “Steganography in Digital Media: Principles, Algorithms, and Applications”, Cambridge University Press, 2009.
[10] Digiatl content for steganography, link” www. garykessler.net / library / steganography.html”.