Open Access   Article Go Back

Improving Image Encryption and Decryption Using WU`s Algorithm

Simy Mary Kurian1 , Nimmymol Manuel2 , Neena Joseph3 , Neema George4

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-1 , Page no. 413-416, Jan-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.413416

Online published on Jan 31, 2018

Copyright © Simy Mary Kurian, Nimmymol Manuel, Neena Joseph, Neema George . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Simy Mary Kurian, Nimmymol Manuel, Neena Joseph, Neema George, “Improving Image Encryption and Decryption Using WU`s Algorithm,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.413-416, 2018.

MLA Style Citation: Simy Mary Kurian, Nimmymol Manuel, Neena Joseph, Neema George "Improving Image Encryption and Decryption Using WU`s Algorithm." International Journal of Computer Sciences and Engineering 6.1 (2018): 413-416.

APA Style Citation: Simy Mary Kurian, Nimmymol Manuel, Neena Joseph, Neema George, (2018). Improving Image Encryption and Decryption Using WU`s Algorithm. International Journal of Computer Sciences and Engineering, 6(1), 413-416.

BibTex Style Citation:
@article{Kurian_2018,
author = {Simy Mary Kurian, Nimmymol Manuel, Neena Joseph, Neema George},
title = {Improving Image Encryption and Decryption Using WU`s Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2018},
volume = {6},
Issue = {1},
month = {1},
year = {2018},
issn = {2347-2693},
pages = {413-416},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5499},
doi = {https://doi.org/10.26438/ijcse/v6i1.413416}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.413416}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5499
TI - Improving Image Encryption and Decryption Using WU`s Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - Simy Mary Kurian, Nimmymol Manuel, Neena Joseph, Neema George
PY - 2018
DA - 2018/01/31
PB - IJCSE, Indore, INDIA
SP - 413-416
IS - 1
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
186 226 downloads 116 downloads
  
  
           

Abstract

In this advanced world, pictures are generally utilized in various cycles. Along these lines, the security of picture and information from unapproved utilizes is significant. Presently, data security is turning out to be progressively significant in information capacity and broadcasting. It is fundamental for getting picture, either on the way or store on gadgets. Nonetheless, some picture encryption calculations actually have numerous security issues and can be effortlessly gone after by assailants. This proposed framework plays out the cryptanalysis of a recently proposed variety picture encryption scheme utilizing Wu`s algorithms. For encryption plot, typically utilizes a pseudo-irregular encryption key created by a calculation and which makes the picture safer. An approved recipient can without much of a stretch unscramble the message with the mystery key given by the originator to recipient however not to unapproved clients.

Key-Words / Index Term

Encryption, Wu’s algorithms

References

[1] W. Stallings, “Cryptography and Network Security”,Fourth Edition, Prentice Hall, Vol. 16, 2005.
[2] Eberhart, R. C. "Chaos theory for the biomedical engineer" IEEE engineering in medicine and biology magazine: the quarterly magazine of the Engineering in Medicine & Biology Society,Vol. 8, Issue 3, pp. 41-45,1998.
[3] Lorenz, Edward N. "Deterministic non-periodic flow". Journal of the Atmospheric Sciences Vol.20 Issue.2, pp.130-141,1963.
[4] Zouhozr Ben Jemaa, Safya Belghzth "Correlation properties of binary sequences generated by the logistic map-application to DSCDMA." Proceedings of IEEE International Conference on Systems, Man and Cybernetics, Hammamet, Tunisia. pp. 447-451,2002
[5] Jin-mei Liu, Qiang Qu, "Cryptanalysis of a substitution-diffusion based image cipher using chaotic standard and logistic map" Proceedings of Third International Symposium on Information Processing, pp. 67-69,2010
[6] M. Salleh, S. Ibrahim, I. F. Isnin, "Enhanced chaotic image encryption algorithm based on Baker`s map." Proceedings of IEEE Conference on Circuits and Systems, Vol.2, pp. 508-511,2002
[7] K. Wang, W. Pei, L. Zou, A. Song, Z. He, "On the security of 3D Cat map based symmetric image encryption scheme," Physics Letters A, Vol. 343, pp. 432-439,2005
[8] Vinodh P Vijayan, Deepti John, Merina Thomas, Neetha V Maliackal, Sara Sangeetha Varghese “Multi Agent Path Planning Approach to Dynamic Free Flight Environment”, International Journal of Recent Trends in Engineering (IJRTE), pp.41-46,2009
[9] Juby Joseph, Vinodh P Vijayan” Misdirection Attack in WSN Due to Selfish Nodes; Detection and Suppression usingLonger Path Protocol” International Journal of Advanced Research in Computer Science and Software Engineering, Vol 4, Issue 7, pp. 825-829,2014
[10] V P Vijayan, Biju Paul “Multi Objective Traffic Prediction Using Type-2 Fuzzy Logic and Ambient Intelligence”,IEEE International Conference on Advances in Computer Engineering, Published in IEEE Computer Society Proceedings, 2010