Downloads: 111 | Views: 122
Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 6, June 2015
Image Compression Approach for Encryption and Decryption using RGB Content with DCT Function
Anita  | Bhavneesh Malik
Abstract: in this cryptosystem, we have considered RGB images for two-dimensional (2D) data security. Security of RGB images during transmission is a major concern, discussed globally. This paper proposes a novel technique for color image security by random cipher associated with 2D discrete cosine transform. Existing techniques have discussed the security of image data on the basis of the keys only (which provide only one layer of security for image data), but in the proposed cryptosystem, the keys and the arrangement of cipher parameters are imperative for correct decryption of color image data. Additionally, key multiplication side (pre or post) with The RGB image data should inevitably be known, to correctly decrypt the encrypted image data. So, the proposed cryptosystem provides three layers of security for RGB image data. A computer simulation on standard examples and results is given to support the fixture of the scheme. Security analysis and detailed comparison between formerly developed techniques and proposed cryptosystem are also discussed for the robustness of the technique. This method will have large potential usage in the digital RGB image processing and the security of image data. There are many image encryption schemes have been proposed, each one of them has its advantages and disadvantages. This paper presents practical approach on image encryption and decryption technique using matrix transformation. The proposed scheme is useful for encryption of large amounts of data, such as digital images. First, we use discrete cosine transformation to get a blocked image. Second, a pair of keys is given by using matrix transformation. Third, the image is encrypted using private key in its transformation domain. Finally the receiver uses the public key to decrypt the encrypted messages. This technique satisfies the characters of convenient realization, less computation complexity and good security. The salient features of the proposed image encryption method are loss-less, symmetric private key encryption, a very large number of secret keys, and key-dependent pixel value replacement.
Keywords: Data security, cipher, data encryption, data decryption, cryptography, discrete cosine transform
Edition: Volume 4 Issue 6, June 2015,
Pages: 2231 - 2236
Similar Articles with Keyword 'Data security'
Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 8, August 2014Pages: 1980 - 1987
Implementation of Secured Data Transmission System on Customized Zynq SoC
D. Dhanalaxmi | V. Roopa Reddy
Review Papers, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015Pages: 2663 - 2667
Security Based Variable Holographic Data Encryption using Spatial Light Modulator
Aswathy.J.R | Sajan Ambadiyil | Helen Mascreen