Data Encryption Key Sharing Using Image Pixel Color Value
DOI:
https://doi.org/10.32628/CSEIT195161Keywords:
Network Security, Cryptographic Algorithms, Image Pixel, Data Encryption, Public-Key Cryptosystem, Encryption, DecryptionAbstract
Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. Massage communication over internet facing problems like data security, copyright control, data size capacity, authentication etc. A new idea is to apply reversible data encoding algorithms images by wishing to remove the embedded data after data receiving with the help of image pixel color value.
References
- Amare Anagaw Ayele, Dr. Vuda Sreenivasarao, June 2013, "A Modified RSA Encryption Technique Based on Multiple public keys", International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 4.
- Liang Wang, Yonggui Zhang, 2011, "A New Personal Information Protection Approach Based on RSA Cryptography", IEEE.
- Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah, 2013, "Quantum Key Distribution by Using Public Key Algorithm(RSA)", IEEE.
- Norhidayah Muhammadi, Jasni Mohamad Zaini, Md Yazid Mohd Saman, "Loop-based RSA Key Generation Algorithm using String Identity", 13th International Conference on Control, Automation and Systems (ICCAS 2013).
- Ms. Ritu Patidar, Mrs. Rupali Bhartiya, 2013, "Modified RSA Cryptosystem Based on Offline Storage and Prime Number", IEEE.
- Malek Jakob Kakish, "Enhancing The Security Of The Rsa Cryptosystem", Ijrras August 2011.
- M. Jason Hinek, Another Look at Small RSA Exponents, 2006.
- B. A. Forouzan, D. Mukhopadhyay, Cryptography and Network Security, Tata McGraw-Hill, 2012.
- Abdullah Darwish Imad Khaled Salah and Saleh Oqeili, Mathematical Attacks on RSA Cryptosystem, Journal of Computer Science (2006).
- J. M. Pollard, A Monte Carlo Method for Factorization, BIT Numerical Mathematics (1975).
- H. Riesel, Prime Numbers and Computer Methods for Factorization, Birkhauser, 1994.
- William Stein, Elementary number theory. Primes, congruences, and secrets. A computational approach., New York, NY: Springer, 2009 (English).
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.