Skip to main content

A Cryptographic Key Generation on a 2D Graphics Using RGB Pixel Shuffling and Transposition

  • Conference paper
  • First Online:
Book cover Proceedings of the International Conference on Data Engineering and Communication Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 469))

Abstract

Now a day with incredible change in social media network like mobile communication and computer, all type of a data, such as audio, video, images are used for the communication. Privacy for that data is an important issue. Cryptography is one of the techniques used for stopping unauthorized access and increasing integrity of that data. In research area encryption and decryption scheme is used based on image pixel shuffling and transposition. For security purpose, we can use cipher algorithm for generating key using RGB values of the pixel instead of using only pixel values. For that purpose in our proposed system we are using m*n size image on which different operations can be performed. Our proposed system is more secure as compare to existing system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pratik Shrivastava, Reteshjain, K.S. RaghuWanshi, A modified. Approach of key manipulation in cryptography using 2D graphics Image, Published in Proceeding ICESC ‘14 Proceedings of the 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies Pages 194–197, IEEE Computer Society Washington, DC, USA ©2014.

    Google Scholar 

  2. Xiukum Li, Xianggian Wu*, Ning Qi, KuanquanWang. A novel cryptographic Algorithm based on iris feature, 2008.

    Google Scholar 

  3. ShujiangXu, YinglongWang, YucuiGuo, Cong Wang, “A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map”, IJIGSP, vol. 2, no. 1, pp. 61–68, 2010.

    Google Scholar 

  4. Krishnan, G.S.; Loganathan, D.;, “Color image cryptography scheme based on visual cryptography,” Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011 International Conference on, vol., no., pp. 404–407, 21–22 July 2011.

    Google Scholar 

  5. Christy, J.I.; Seenivasagam, V., “Construction of color Extended Visual Cryptographic scheme using Back Propagation Network for color images,” Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on, vol., no., pp. 1101–1108, 21–22 March 2011.

    Google Scholar 

  6. B. Santhi, K.S. Ravichandran, A.P. Arun and L. Chakkarapani Novel Cryptographic Key Generation Method Using Image Features, 2012.

    Google Scholar 

  7. Kester, Quist-Aphetsi;, “A public-key exchange cryptographic technique using matrix,” Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference on, vol., no., pp. 78–81, 25–27 Oct. 2012.

    Google Scholar 

  8. RuisongYe, WeiZhou, “A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice”, IJCNIS, vol. 4, no. 1, pp. 38–44, 2012.

    Google Scholar 

  9. Asia mahdiNaserAlzubaid, Cotor Image Encryption & decryption using pixel shuffling with Henon chaotic syste, 2014.

    Google Scholar 

  10. AmneshGoel, NidhiChandra, “A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based On Sorting Group Wise Of RGB Values and Explosive Inter-Pixel Displacement”, IJIGSP, vol. 4, no. 2, pp. 16–22, 2012.

    Google Scholar 

  11. Panchami V, Varghes Amithab Wahi, A New Color ORIENTED Cryptographic Algorithm Based on Unicode And RGB Color Model, 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Londhe Swapnali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Londhe Swapnali, Jagtap Megha, Shinde Ranjeet, Belsare, P.P., Ashwini, G.B. (2017). A Cryptographic Key Generation on a 2D Graphics Using RGB Pixel Shuffling and Transposition. In: Satapathy, S., Bhateja, V., Joshi, A. (eds) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 469. Springer, Singapore. https://doi.org/10.1007/978-981-10-1678-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1678-3_18

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1677-6

  • Online ISBN: 978-981-10-1678-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics