News Updates Monday 21st Apr 2014 :
  • Welcome to International Press Corporation, world's leading publishers, We have served more than 4000+ authors
  • Article are invited for March/April 2014 issue, Articles can be submitted directly to the concerned editors mails
  • Paper submission last date in IJCET Mar/Apr 2014 issue is 30 April, Submit online or at editor.ijcet@inpressco.com
  • The authors can submit articles in engineering, science, technology, management, industrial engg, biotechnology
  • Global Impact Factor for our journal IJCET-2.552, IJTT-1.129 for the year 2012, Evaluation for 2013 is in progress

A Secure Approach to Image Encryption of color image without using key


Author : Shobha Patil and V.R.Udupi

Pages : 192-199
Download PDF
Abstract

The advent of internet introduced to its users a new dimension as to how data can be shared from one part of the world to the other in near real time. However along with these opportunities came the challenges, such as, how to maintain the confidentiality of the data being transmitted. This gave a fillip to the already vibrant research area of cryptography. Encryption of images with the traditional encryption algorithms such as RSA, DES etc. But drawback of this approach is key management is difficult and keys for encryption are limited. This gave rise to a new area of research for encrypting images that is splitting an image at the pixel level into multiple shares (two or more), such that individually the shares convey no information about the image, but a qualified set of these shares will help to regenerate the original image. But drawback of this second approach is that is quality of the recovered image is poor. So to overcome these drawbacks propose a new approach that is encrypting the image without using any public or private keys. In this approach we are using sieving division shuffling algorithm to generate random shares. After decryption the quality of the recovered image is same as original image and low storage and bandwidth requirements needed.

Keywords: Visual Cryptography, image encryption, image decryption, Random shares, sieving, division shuffling, combining

Article published in the Proceedings of National Conference on ‘Women in Science & Engineering’ (NCWSE 2013), SDMCET Dharwad

 

 

 

 

 

Call for Papers
  1. IJCET- March/April-2014 Issue

    Submission Last Date extended to

    30 April-2014
  2. IJAIE-March-2014
  3. IJCSB-March-2014
Submit Articles to Editors

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2014 INPRESSCO® All Rights Reserved