Open Access Open Access  Restricted Access Subscription or Fee Access

A New Approach for Security Enhancement of Image Data through Double Encryption

G. Ananthalakshmi, S. Ramamoorthy

Abstract


Security is the main concern in today’s world and securing data from unauthorized access is very important. Different techniques should be used to protect confidential image data from unauthorized access as each type of data has its own features. Encryption is used to prevent data from unauthorized access and with the appalling headway in network technology seen in the past decade; it has become the need of time to encrypt the images before sending over open network. Cryptography is a very effective way to protect transmitted information. Though researchers have proposed contrastive methods to encrypt images, only few methods provide security and confidentiality. So, here we introduce a new image encryption method which encrypts the image using a key involving Armstrong numbers and Prime numbers. The basic idea is to perform double encryption of images, which involves encryption first by Armstrong number followed by Prime number. Algorithms are proposed for efficient implementation of Double Encryption. Moreover, an image-based data requires more effort during encryption and decryption. Nowadays, images are vastly used in today's world to represent information in various domains varying from corporate world, health care, document organization, military operations etc.

Keywords


Armstrong Numbers, Cryptography, Double Encryption, Image Encryption, Prime Numbers

Full Text:

PDF

References


G.Ananthalakshmi, S.Ramamoorthy, ”A Multilevel Encryption Scheme for Secure Network Data Transfer”, International Conference on Computing and Control Engineering(ICCCE 2012), 12 &13 April, 2012

S. Pavithra Deepa, S. Kannimuthu, V. Keerthika,”Security using Colors and Armstrong Numbers”, Proceedings of the National Conference on Innovations in Emerging Technology-2011, pp.157-160

Jerry Crow, ”Prime numbers in Public-key Cryptography”, 2003

Artan Luma,” “Data Encryption and Decryption using ANZF algorithm”, 2006

Atul Kahate, “Cryptography and Network Security “, Tata McGraw Hill Publications

http://aix1.uottawa.ca/~jkhoury/cryptography.htm

Information available via www at http://en.wikipedia.org/wiki/Open_communication.

Jayant Kushwaha, Bhola Nath Roy, “Secure Image Data by Double Encryption”, International Journal of Computer Applications (0975 – 8887)Volume 5– No.10, August 2010


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.