Secured Image encryption/decryption using advanced 4 out of 8 code

  IJCTT-book-cover
 
         
 
© 2020 by IJCTT Journal
Volume-68 Issue-4
Year of Publication : 2020
Authors : Rahul Siddhartha, Raghav Jhawar, Harsh Saxena
DOI :  10.14445/22312803/IJCTT-V68I4P124

How to Cite?

Rahul Siddhartha, Raghav Jhawar, Harsh Saxena, "Secured Image encryption/decryption using advanced 4 out of 8 code," International Journal of Computer Trends and Technology, vol. 68, no. 4, pp. 145-150, 2020. Crossref, https://doi.org/10.14445/22312803/IJCTT-V68I4P124

Abstract
Information hiding has been on a rise in recent times. New steganography techniques have evolved to secure data and enhance privacy. The image encryption employs carrier image creation for encryption. Here the carrier image is made with the assistance of alphanumeric key phrase. Each alphanumeric key will have a unique 8-bit value produced by advanced 4 out of8code.This newly produced carrier image is added with actual image to get encrypted image. The reverse procedure results the decrypted image. In order to improve the security against attacks we even include a cryptographic function which provides authentication and security to the received password generated which is to be given bythe receiver to decrypt the encrypted image. This paper involves a key management system in which every time a new password is generated according to the keyword entered by the sender.

Keywords
Steganography, carrier image, advanced 4 out of 8 code, authentication, security, key management system.

Reference
[1] Panduranga H.T, Naveen Kumar S.K, (Submitted on 5 Mar 2010), “Hybrid approach for Image Encryption Using SCAN Patterns andCarrierImages”,IJCSE,Vol.2,No.2March 2010
[2] Sunil Kumar K.M, Kiran Kiran, Anand U. Hiremath, (Published 2013), “Image Encryption usingmodified4outof8codeandchaoticmap”,International Journal of Computer Applications (0975 8887) Volume 74 - No. 11, July 2013
[3] T. Sivakumar and R. Venkatesan, (Published2014),“ANovelApproachforImage Encryption using Dynamic SCAN Pattern”, International Journal of Computer Science 41(2):91-101, May2014
[4] Reza Moradi Rad, Abdolrahman Attar, and RezaEbrahimiAtani,(Published2013),“ANew Fast and Simple Image Encryption Algorithm Using Scan Patterns and XOR” International Journal of Signal Processing, ImageProcessing and Pattern Recognition Vol.6, No.5,2013
[5] A Mitra, YVS Rao, SRM Prasanna, (Published 2006), “A New Image Encryption Approach using Combinational Permutation Techniques”, International Journal of Electrical and Computer Engineering 1:2,2006