Open Access   Article Go Back

Region Based Cryptography: A Study of Difference Between the .jpg Image and .png Image After Recombined RGB Images

Irfan Jalal Bhat1 , Raghav Mehra2 , Amit Kumar Chaturvedi3

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 606-609, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.606609

Online published on Feb 28, 2019

Copyright © Irfan Jalal Bhat, Raghav Mehra, Amit Kumar Chaturvedi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Irfan Jalal Bhat, Raghav Mehra, Amit Kumar Chaturvedi, “Region Based Cryptography: A Study of Difference Between the .jpg Image and .png Image After Recombined RGB Images,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.606-609, 2019.

MLA Style Citation: Irfan Jalal Bhat, Raghav Mehra, Amit Kumar Chaturvedi "Region Based Cryptography: A Study of Difference Between the .jpg Image and .png Image After Recombined RGB Images." International Journal of Computer Sciences and Engineering 7.2 (2019): 606-609.

APA Style Citation: Irfan Jalal Bhat, Raghav Mehra, Amit Kumar Chaturvedi, (2019). Region Based Cryptography: A Study of Difference Between the .jpg Image and .png Image After Recombined RGB Images. International Journal of Computer Sciences and Engineering, 7(2), 606-609.

BibTex Style Citation:
@article{Bhat_2019,
author = {Irfan Jalal Bhat, Raghav Mehra, Amit Kumar Chaturvedi},
title = {Region Based Cryptography: A Study of Difference Between the .jpg Image and .png Image After Recombined RGB Images},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {606-609},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3712},
doi = {https://doi.org/10.26438/ijcse/v7i2.606609}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.606609}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3712
TI - Region Based Cryptography: A Study of Difference Between the .jpg Image and .png Image After Recombined RGB Images
T2 - International Journal of Computer Sciences and Engineering
AU - Irfan Jalal Bhat, Raghav Mehra, Amit Kumar Chaturvedi
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 606-609
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
289 180 downloads 99 downloads
  
  
           

Abstract

Today is the age of information and technology. We cannot proceed even a single step without it. We are fully dependent on information and technology. In this paper we will show that which image is best after recombined of RGB image. First we take .jpg image, differentiate it and then recombined to obtained the final image and again we take the .png image, differentiate it RGB , recombined it to get final image .At last we will compare the final image of .jpg and .png and see different.

Key-Words / Index Term

Region Based Cryptography, .jpg image, .png image, secrets, sharing

References

[1] Blakley, G. "Safeguarding cryptographic keys". Proceedings of AFIPS 1979. 48: 313–317.
[2] Shamir, A. "How to share a secret". Communications of the ACM. 1979,22 (11): 612–613. doi:10.1145/359168.359176.
[3] Naor M, Shamir A. Visual cryptography. In: Workshop on the Theory and Application of Cryptographic Techniques;9{12 May 1994; Perugia, Italy. pp. 1-12.
[4] Sandeep Gurung, Bijoy Chhetri, Mrinal Kanti Ghose “A Novel approach for Circular Random Grid with Share Authentication”. 2015 IEEE
[5] Arash Karimi, Hadi Shahriar Shahhoseini “Cryptanalysis of a Substitution-Permutation Network Using Gene Assembly in Ciliates” Int`l J. of Communications, Network and System Sciences Vol. 5 No. 3 ,2012.
[6] B. Saha, “A Comparative Analysis of Histogram Equalization Based Image Enhancement Technique for Brightness Preservation”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 3, Issue. 3, pp. 1-5, 2015.
[7] P. Sharma1,ishra2, V.K. Sarthi3, P. Bhatpahri4, R. Shrivastava5 “ Visual Encryption Using Bit Shift Technique” International Journal of Scientific Research in Computer Science and Engineering Vol.5, Issue.3, pp.57-61, June (2017)
[8] M. Arora1*, S. Sharma2 “Synthesis of Cryptography and Security Attacks” IJSRNSC Volume-5, Issue-5, Oct 2017
[9] A. Canteaut, “Correlation attack for stream ciphers”, Encyclopedia of Cryptography and Security, pp. 261–262. Springer US, 2011.
[10] T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only. Computers”, IEEE Transactions , Vol.C-34 Issue.1pp.81–85, 1985.
[11] Fakhari P, Vahedi E, Lucas C. Protecting patient privacy from unauthorized release of medical images using a bio-inspired wavelet-based watermarking approach. Digit Signal Process 2011; 21: 433-446
[12] .Hou YC. Visual cryptography for color images. Pattern Recogn 2003; 36: 1619-1629.
[13] Hou YC, Quan ZY. Progressive visual cryptography with unexpanded shares. IEEE T Circ Syst Vid 2011; 21:1760-1764.
[14] Hou YC, Quan ZY, Tsai CF, Tseng AY. Block-based progressive visual secret sharing. Inform Sciences 2013; 233:290-304.
[15] Ito R, Kuwakado H, Tanaka H. Image size invariant visual cryptography. IEICE T Fund Electr 1999; E82-A:2172-2177.
[16] Shyu SJ. Image encryption by random grids. Pattern Recogn 2007; 40: 1014-1031.
[17] D. Boneh and M. Franklin, “Identity-based encryption from theWeil pairing, in: Advances in Cryptology – CRYPTO Lect.Notes in Comput. Sci. 2139, Springer-Verlag, pp. 213-229(2001)