Data Encryption Key Sharing Using Image Pixel Color Value

Authors

  • Vijay Gokul Koli  Department of Computer Science & Engineering, Vedica Institute of Technology, Bhopal, India
  • Raj Kumar Paul  Department of Computer Science & Engineering, Vedica Institute of Technology, Bhopal, India

DOI:

https://doi.org//10.32628/CSEIT195161

Keywords:

Network Security, Cryptographic Algorithms, Image Pixel, Data Encryption, Public-Key Cryptosystem, Encryption, Decryption

Abstract

Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. Massage communication over internet facing problems like data security, copyright control, data size capacity, authentication etc. A new idea is to apply reversible data encoding algorithms images by wishing to remove the embedded data after data receiving with the help of image pixel color value.

References

  1. Amare Anagaw Ayele, Dr. Vuda Sreenivasarao, June 2013, "A Modified RSA Encryption Technique Based on Multiple public keys", International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 4.
  2. Liang Wang, Yonggui Zhang, 2011, "A New Personal Information Protection Approach Based on RSA Cryptography", IEEE.
  3. Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah, 2013, "Quantum Key Distribution by Using Public Key Algorithm(RSA)", IEEE.
  4. Norhidayah Muhammadi, Jasni Mohamad Zaini, Md Yazid Mohd Saman, "Loop-based RSA Key Generation Algorithm using String Identity", 13th International Conference on Control, Automation and Systems (ICCAS 2013).
  5. Ms. Ritu Patidar, Mrs. Rupali Bhartiya, 2013, "Modified RSA Cryptosystem Based on Offline Storage and Prime Number", IEEE.
  6. Malek Jakob Kakish, "Enhancing The Security Of The Rsa Cryptosystem", Ijrras August 2011.
  7. M. Jason Hinek, Another Look at Small RSA Exponents, 2006.
  8. B. A. Forouzan, D. Mukhopadhyay, Cryptography and Network Security, Tata McGraw-Hill, 2012.
  9. Abdullah Darwish Imad Khaled Salah and Saleh Oqeili, Mathematical Attacks on RSA Cryptosystem, Journal of Computer Science (2006).
  10. J. M. Pollard, A Monte Carlo Method for Factorization, BIT Numerical Mathematics (1975).
  11. H. Riesel, Prime Numbers and Computer Methods for Factorization, Birkhauser, 1994.
  12. William Stein, Elementary number theory. Primes, congruences, and secrets. A computational approach., New York, NY: Springer, 2009 (English).

Downloads

Published

2019-02-28

Issue

Section

Research Articles

How to Cite

[1]
Vijay Gokul Koli, Raj Kumar Paul, " Data Encryption Key Sharing Using Image Pixel Color Value, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.260-265, January-February-2019. Available at doi : https://doi.org/10.32628/CSEIT195161