IJCNIS Vol. 10, No. 5, 8 May 2018
Cover page and Table of Contents: PDF (size: 455KB)
Full Text (PDF, 455KB), PP.60-69
Views: 0 Downloads: 0
Artificial Neural Networks, connectionist systems, Image Encryption, Cryptography, Decryption
Information is by far the most precious thing in almost every field. Everything we do in the present-day world generated some data and most of the data are vulnerable to unwanted threats. The organizations and agencies are becoming more and more dependent on their digitized information systems. Also, the general public is slowly getting cyber- conscious and thus they also fear for the leak and tampering of their secured information. Today’s information systems are under the constant threats of manipulation and overriding by various criminal organizations. Thus, the information in today’s world is kept under the password authentication. These passwords are a combination of a string of alphanumeric and special characters. Also, the key used to encrypt the information are exposed to either both or one of the parties. To overcome this vulnerability, an encryption technique is proposed where the key will be generated and transmitted using TPM and the final encrypted text will be stored in the image format by segregating the text data into the 3-channelled image, i.e., RGB.
Sanjay Kumar Pal, Sumeet Anand, "Cryptography Based on RGB Color Channels using ANNs", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.5, pp.60-69, 2018. DOI:10.5815/ijcnis.2018.05.07
[1]Zell, Andreas (1994). Simulation Neuronaler Netze [Simulation of Neural Networks] (in German) (1st ed.). Addison-Wesley. p. 73. ISBN 3-89319-554-8.
[2]Diffie, W.; Hellman, M. (1976). "New directions in cryptography" (PDF). IEEE Transactions on Information Theory. 22 (6): 644–654. doi:10.1109/TIT.1976.1055638.
[3]Matt Valeriote, ―Public Key Cryptography‖, McMaster University, October 2014.
[4]Kartit, Zaid (February 2016). "Applying Encryption Algorithms for Data Security in Cloud Storage, Kartit, et. al". Advances in ubiquitous networking: proceedings of UNet15: 147.
[5]Delfs, Hans & Knebl, Helmut (2007). "Symmetric-key encryption". Introduction to cryptography: principles and applications. Springer. ISBN 9783540492436.
[6]Mullen, Gary & Mummert, Carl (2007). Finite fields and applications. American Mathematical Society. p. 112. ISBN 9780821844182.
[7]Kumar Pal, Sanjay & Sen Sarma, Samar. (2012). Hiding Information Using the Graph Colouring Technique. International Journal of Applied Research on Information Technology and Computing. 3. 172. 10.5958/j.0975-8070.3.3.017.
[8]Aditya Gaitonde, “Color Coded Cryptography”, International Journal of Scientific & Engineering Research, Volume 3, Issue 7, July-2012 1 ISSN 2229-5518
[9]Q. A. Keste, "Image Encryption based on the RGB PIXEL Transposition and Shuffling," I. J. Computer Network and Information Security, 7, in MECS (http://www.mecs-press.org/), DOI: 10.5815/ijcnis.2013.07.05, pp.43-50, Published Online June 2013
[10]P. Junwale, R. M. Annapurna, and G. Sobha, "A Review on Image Encryption Technique based on Hyper Image Encryption Algorithm," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 11, pp. 614-618, November – 2013.
[11]K. Kushwah, S. Shibu, "New Image Encryption Technique Based On Combination of Block Displacement and Block Cipher Technique," International Journal of Computer Science and Information Technologies, vol. 4, no. 1, pp. 61 – 65, 2013.
[12]Manish Kumar, D.C. Mishra, R.K. Sharma, “A first approach on an RGB image encryption”, http://web.iitd.ac.in/~rksharma/Research%20Publications/Journal/Deep_OLE.pdf
[13]M.AL-Laham, Mohamad. “Encryption-Decryption RGB Color Image Using Matrix Multiplication.” International Journal of Computer Science and Information Technology 7.5 109–119. Web.
[14]Rajesh N, Sushmashree S, Varshini V, Bhavani N B, Pradeep D, “Color Code Based Authentication And Encryption”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 5, May 2015.
[15]M.Karolin, Dr.T.Meyyapan, “RGB Based Secret Sharing Scheme in Color Visual Cryptography”. International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 7, July 2015.
[16]Sanjay Kumar Pal, Samar Sen Sarma, Graph Coloring Approach for Hiding of Information, Procedia Technology, Volume 4, 2012, Pages 272-277, ISSN 2212-0173, https://doi.org/10.1016/j.protcy.2012.05.042. (http://www.sciencedirect.com/science/article/pii/S2212017312003210)
[17]Singh, Ajit; Nandal, Aarti (May 2013). "Neural Cryptography for Secret Key Exchange and Encryption with AES" (PDF). International Journal of Advanced Research in Computer Science and Software Engineering. 3 (5): 376–381. ISSN 2277-128X.
[18]Sanjay Kumar Pal, Suman De,"An Encryption Technique based upon Encoded Multiplier with Controlled Generation of Random Numbers", IJCNIS, vol.7, no.10, pp.50-57, 2015.DOI: 10.5815/ijcnis.2015.10.06
[19]Sanjay Kr. Pal, Nupur Chakraborty,"Application of Cosmos's law of Merge and Split for Data Encryption", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.5, pp.11-20, 2017.DOI: 10.5815/ijcnis.2017.05.02
[20]Ahmad Gaeini, “Comparing Some Pseudo-Random Number Generators and Cryptography Algorithms Using a General Evaluation Pattern”, I.J. Information Technology and Computer Science, 2016, 9, 25-31 Published Online September 2016 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2016.09.04
[21]Quist-Aphetsi Kester,"Image Encryption based on the RGB PIXEL Transposition and Shuffling", IJCNIS, vol.5, no.7, pp.43-50, 2013. DOI: 10.5815/ijcnis.2013.07.05
[22]M.I.Khalil,"Real-Time Encryption / Decryption of Audio Signal", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.2, pp.25-31, 2016.DOI: 10.5815/ijcnis.2016.02.03
[23]Nisar Ahmed, Hafiz Muhammad Shahzad Asif, Gulshan Saleem,"A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.12, pp.18-29, 2016.DOI: 10.5815/ijcnis.2016.12.03
[24]Satyendra Nath Mandal, Subhankar Dutta, Ritam Sarkar,"Block-Based Symmetry Key Visual Cryptography", IJCNIS, vol.4, no.9, pp.10-19, 2012.