Abstract
Now a day with incredible change in social media network like mobile communication and computer, all type of a data, such as audio, video, images are used for the communication. Privacy for that data is an important issue. Cryptography is one of the techniques used for stopping unauthorized access and increasing integrity of that data. In research area encryption and decryption scheme is used based on image pixel shuffling and transposition. For security purpose, we can use cipher algorithm for generating key using RGB values of the pixel instead of using only pixel values. For that purpose in our proposed system we are using m*n size image on which different operations can be performed. Our proposed system is more secure as compare to existing system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pratik Shrivastava, Reteshjain, K.S. RaghuWanshi, A modified. Approach of key manipulation in cryptography using 2D graphics Image, Published in Proceeding ICESC ‘14 Proceedings of the 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies Pages 194–197, IEEE Computer Society Washington, DC, USA ©2014.
Xiukum Li, Xianggian Wu*, Ning Qi, KuanquanWang. A novel cryptographic Algorithm based on iris feature, 2008.
ShujiangXu, YinglongWang, YucuiGuo, Cong Wang, “A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map”, IJIGSP, vol. 2, no. 1, pp. 61–68, 2010.
Krishnan, G.S.; Loganathan, D.;, “Color image cryptography scheme based on visual cryptography,” Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011 International Conference on, vol., no., pp. 404–407, 21–22 July 2011.
Christy, J.I.; Seenivasagam, V., “Construction of color Extended Visual Cryptographic scheme using Back Propagation Network for color images,” Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on, vol., no., pp. 1101–1108, 21–22 March 2011.
B. Santhi, K.S. Ravichandran, A.P. Arun and L. Chakkarapani Novel Cryptographic Key Generation Method Using Image Features, 2012.
Kester, Quist-Aphetsi;, “A public-key exchange cryptographic technique using matrix,” Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference on, vol., no., pp. 78–81, 25–27 Oct. 2012.
RuisongYe, WeiZhou, “A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice”, IJCNIS, vol. 4, no. 1, pp. 38–44, 2012.
Asia mahdiNaserAlzubaid, Cotor Image Encryption & decryption using pixel shuffling with Henon chaotic syste, 2014.
AmneshGoel, NidhiChandra, “A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based On Sorting Group Wise Of RGB Values and Explosive Inter-Pixel Displacement”, IJIGSP, vol. 4, no. 2, pp. 16–22, 2012.
Panchami V, Varghes Amithab Wahi, A New Color ORIENTED Cryptographic Algorithm Based on Unicode And RGB Color Model, 2014.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Londhe Swapnali, Jagtap Megha, Shinde Ranjeet, Belsare, P.P., Ashwini, G.B. (2017). A Cryptographic Key Generation on a 2D Graphics Using RGB Pixel Shuffling and Transposition. In: Satapathy, S., Bhateja, V., Joshi, A. (eds) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 469. Springer, Singapore. https://doi.org/10.1007/978-981-10-1678-3_18
Download citation
DOI: https://doi.org/10.1007/978-981-10-1678-3_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1677-6
Online ISBN: 978-981-10-1678-3
eBook Packages: EngineeringEngineering (R0)