International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 6, June 2015

Image Compression Approach for Encryption and Decryption using RGB Content with DCT Function

Anita, Bhavneesh Malik

in this cryptosystem, we have considered RGB images for two-dimensional (2D) data security. Security of RGB images during transmission is a major concern, discussed globally. This paper proposes a novel technique for color image security by random cipher associated with 2D discrete cosine transform. Existing techniques have discussed the security of image data on the basis of the keys only (which provide only one layer of security for image data), but in the proposed cryptosystem, the keys and the arrangement of cipher parameters are imperative for correct decryption of color image data. Additionally, key multiplication side (pre or post) with The RGB image data should inevitably be known, to correctly decrypt the encrypted image data. So, the proposed cryptosystem provides three layers of security for RGB image data. A computer simulation on standard examples and results is given to support the fixture of the scheme. Security analysis and detailed comparison between formerly developed techniques and proposed cryptosystem are also discussed for the robustness of the technique. This method will have large potential usage in the digital RGB image processing and the security of image data. There are many image encryption schemes have been proposed, each one of them has its advantages and disadvantages. This paper presents practical approach on image encryption and decryption technique using matrix transformation. The proposed scheme is useful for encryption of large amounts of data, such as digital images. First, we use discrete cosine transformation to get a blocked image. Second, a pair of keys is given by using matrix transformation. Third, the image is encrypted using private key in its transformation domain. Finally the receiver uses the public key to decrypt the encrypted messages. This technique satisfies the characters of convenient realization, less computation complexity and good security. The salient features of the proposed image encryption method are loss-less, symmetric private key encryption, a very large number of secret keys, and key-dependent pixel value replacement.

Keywords: Data security, cipher, data encryption, data decryption, cryptography, discrete cosine transform

Edition: Volume 4 Issue 6, June 2015

Pages: 2231 - 2236


How to Cite this Article?

Anita, Bhavneesh Malik, "Image Compression Approach for Encryption and Decryption using RGB Content with DCT Function", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=17061502, Volume 4 Issue 6, June 2015, 2231 - 2236

41 PDF Views | 27 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data security'

Review Papers, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2663 - 2667

Security Based Variable Holographic Data Encryption using Spatial Light Modulator

Aswathy.J.R, Sajan Ambadiyil, Helen Mascreen

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1980 - 1987

Implementation of Secured Data Transmission System on Customized Zynq SoC

D. Dhanalaxmi, V. Roopa Reddy

Share this article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2484 - 2492

Implementation of AES Algorithm Using FPGA & Its Performance Analysis

Sonali A. Varhade, N. N. Kasat

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2231 - 2236

Image Compression Approach for Encryption and Decryption using RGB Content with DCT Function

Anita, Bhavneesh Malik

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2914 - 2918

Fully Pipelined High Throughput Cost Effective FPGA Based Implementation of AES Algorithm

Athira Das A J, Ajith Kumar B P

Share this article



Similar Articles with Keyword 'cipher'

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1102 - 1107

Analysis of Stream Ciphers Based on Theoretic Approach

Shisif Pokhrel, Ahmed Abdul Kadhim Basheer

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1062 - 1066

Detect and Correct Single Event Upset of the AES Algorithm in On Board Satellite

Md. Riyaj, Vipin Gupta

Share this article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1865 - 1868

DPA Resistant AES Using a True Random Based LFSR Technique

Reenu Tomy, Vinoj P.G.

Share this article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2338 - 2341

SOC Based Cryptosystem Implementation Using RC4 and IDEA Algorithm

Surekha Pujar, Sleeba Mathew

Share this article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1124 - 1126

Review of Designing Secured Data Using a Combination of LZW Compression, RSA Encryption, and DCT Steganography

Sayli S. Relekar, V. B. Raskar

Share this article



Similar Articles with Keyword 'data encryption'

Review Papers, Electronics & Communication Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1895 - 1896

Different Reviews and Variants of Advance Encryption Standard

Harleen Kaur, Reena Mehla

Share this article

Review Papers, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2663 - 2667

Security Based Variable Holographic Data Encryption using Spatial Light Modulator

Aswathy.J.R, Sajan Ambadiyil, Helen Mascreen

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 3, March 2014

Pages: 642 - 645

Low Power and Area Optimized VHDL Implementation of AES

Suja Chackochan, K. Mathan

Share this article

Research Paper, Electronics & Communication Engineering, Nigeria, Volume 3 Issue 11, November 2014

Pages: 1281 - 1284

Development of a GUI for Hybrid (DES-RSA) Data Encryption and Decryption for Transmission of Biomedical Data

Adedeji Kazeem Bolade, Ponnle Akinlolu Adediran

Share this article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2484 - 2492

Implementation of AES Algorithm Using FPGA & Its Performance Analysis

Sonali A. Varhade, N. N. Kasat

Share this article



Similar Articles with Keyword 'cryptography'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2157 - 2160

Elliptical Curve Cryptography Based Hop-Hop Message Authentication

Devi Radhakrishnan

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2142 - 2145

Image Cryptography Based Upon Scrambling and Random Integer

Gurpreet Singh, Lovleen Kaur

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1062 - 1066

Detect and Correct Single Event Upset of the AES Algorithm in On Board Satellite

Md. Riyaj, Vipin Gupta

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2014 - 2019

Secure Information Transmission Based on Cryptography Fused with Steganography by using Metamorphic Video Encryption

Akash V. Malasane, S. P. Bhonge

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1367 - 1371

New Approach of Intrusion Detection for Malicious Behavior Detection in MANETS

Aruna P Adhav, K T Jadhao

Share this article



Similar Articles with Keyword 'discrete cosine transform'

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1699 - 1704

Algebraic Integer based 2-D DCT Computation using Single Channel Architecture

B. Uday, P. Apsar

Share this article

Review Papers, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1207 - 1209

A Review on OFDM Technique & ITS Implementation

Hitesh Shinde, Manish Barve

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2231 - 2236

Image Compression Approach for Encryption and Decryption using RGB Content with DCT Function

Anita, Bhavneesh Malik

Share this article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1186 - 1191

Design and Implementation of Scalable and Reconfigurable Approximation of DCT

B. Hymavathi, Dr. S. Balaji, D. Anjaneyulu

Share this article

Research Paper, Electronics & Communication Engineering, Egypt, Volume 3 Issue 6, June 2014

Pages: 2431 - 2437

Information Hiding in Video files Using Frequency Domain

Eman A. E. Ahmed, Hassan H. Soliman, Hossam E. Mostafa

Share this article
Top