Data Encryption Key Sharing Using Image Pixel Color Value

Authors(2) :-Vijay Gokul Koli, Raj Kumar Paul

Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. Massage communication over internet facing problems like data security, copyright control, data size capacity, authentication etc. A new idea is to apply reversible data encoding algorithms images by wishing to remove the embedded data after data receiving with the help of image pixel color value.

Authors and Affiliations

Vijay Gokul Koli
Department of Computer Science & Engineering, Vedica Institute of Technology, Bhopal, India
Raj Kumar Paul
Department of Computer Science & Engineering, Vedica Institute of Technology, Bhopal, India

Network Security, Cryptographic Algorithms, Image Pixel, Data Encryption, Public-Key Cryptosystem, Encryption, Decryption

  1. Amare Anagaw Ayele, Dr. Vuda Sreenivasarao, June 2013, "A Modified RSA Encryption Technique Based on Multiple public keys", International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 4.
  2. Liang Wang, Yonggui Zhang, 2011, "A New Personal Information Protection Approach Based on RSA Cryptography", IEEE.
  3. Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah, 2013, "Quantum Key Distribution by Using Public Key Algorithm(RSA)", IEEE.
  4. Norhidayah Muhammadi, Jasni Mohamad Zaini, Md Yazid Mohd Saman, "Loop-based RSA Key Generation Algorithm using String Identity", 13th International Conference on Control, Automation and Systems (ICCAS 2013).
  5. Ms. Ritu Patidar, Mrs. Rupali Bhartiya, 2013, "Modified RSA Cryptosystem Based on Offline Storage and Prime Number", IEEE.
  6. Malek Jakob Kakish, "Enhancing The Security Of The Rsa Cryptosystem", Ijrras August 2011.
  7. M. Jason Hinek, Another Look at Small RSA Exponents, 2006.
  8. B. A. Forouzan, D. Mukhopadhyay, Cryptography and Network Security, Tata McGraw-Hill, 2012.
  9. Abdullah Darwish Imad Khaled Salah and Saleh Oqeili, Mathematical Attacks on RSA Cryptosystem, Journal of Computer Science (2006).
  10. J. M. Pollard, A Monte Carlo Method for Factorization, BIT Numerical Mathematics (1975).
  11. H. Riesel, Prime Numbers and Computer Methods for Factorization, Birkhauser, 1994.
  12. William Stein, Elementary number theory. Primes, congruences, and secrets. A computational approach., New York, NY: Springer, 2009 (English).

Publication Details

Published in : Volume 5 | Issue 1 | January-February 2019
Date of Publication : 2019-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 260-265
Manuscript Number : CSEIT195161
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Vijay Gokul Koli, Raj Kumar Paul, "Data Encryption Key Sharing Using Image Pixel Color Value", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.260-265, January-February-2019. Available at doi :
Journal URL :

Article Preview