Open Access   Article Go Back

Investigation of Efficient SKC Cryptic Algorithm for Image Encipherment and Decipherment Using SMCrypter

Shivlal Mewada1 , Pradeep Sharma2 , SS Gautam3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 1220-1226, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.12201226

Online published on Apr 30, 2019

Copyright © Shivlal Mewada, Pradeep Sharma, SS Gautam . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shivlal Mewada, Pradeep Sharma, SS Gautam, “Investigation of Efficient SKC Cryptic Algorithm for Image Encipherment and Decipherment Using SMCrypter,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.1220-1226, 2019.

MLA Style Citation: Shivlal Mewada, Pradeep Sharma, SS Gautam "Investigation of Efficient SKC Cryptic Algorithm for Image Encipherment and Decipherment Using SMCrypter." International Journal of Computer Sciences and Engineering 7.4 (2019): 1220-1226.

APA Style Citation: Shivlal Mewada, Pradeep Sharma, SS Gautam, (2019). Investigation of Efficient SKC Cryptic Algorithm for Image Encipherment and Decipherment Using SMCrypter. International Journal of Computer Sciences and Engineering, 7(4), 1220-1226.

BibTex Style Citation:
@article{Mewada_2019,
author = {Shivlal Mewada, Pradeep Sharma, SS Gautam},
title = {Investigation of Efficient SKC Cryptic Algorithm for Image Encipherment and Decipherment Using SMCrypter},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {1220-1226},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5020},
doi = {https://doi.org/10.26438/ijcse/v7i4.12201226}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.12201226}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5020
TI - Investigation of Efficient SKC Cryptic Algorithm for Image Encipherment and Decipherment Using SMCrypter
T2 - International Journal of Computer Sciences and Engineering
AU - Shivlal Mewada, Pradeep Sharma, SS Gautam
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 1220-1226
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
451 268 downloads 144 downloads
  
  
           

Abstract

Without image data security, number of problems arises with the security of different image data files, important data and security is required to send and store on cloud with assurance of confidentially, integrity and authenticity of information over the internet, in public or local networks. Image security has become a critical issue, and is playing a vital role in the domain of network communication system and web. So, there is always a need to have a method to guard the confidentiality, integrity and authenticity of images and avoid the unapproved access of image data over insecure communication environment. Various techniques have been investigated and developed to protect data and personal privacy like cryptic algorithms so far. Cryptic algorithms play a vital role in providing the information security against malicious attacks. It is challenging stuff for researchers to find out more efficient and accurate symmetric block cipher cryptic algorithm for image enciphering and deciphering, and to implement cryptic algorithm. There are many research institutes working on block cipher cryptic algorithm for secure data communication web in the form of digital images like; JPEG/JFIF, BMP, PNG TIFF, GIF, Exif, PPM, PNM, HEIF, PGM, PBM, BAT, BPG. In this paper, presents performance analysis of various symmetric algorithms and investigate of more efficient, confidential and secure symmetric block cipher cryptic algorithm for image encryption and decryption, against cryptanalysis attacks using SMCrypter tool.

Key-Words / Index Term

References

[1].?? J.-S. Coron, “What is cryptography,” IEEE Security & Privacy, Vol.4, Issue.1, pp.70-73, 2006.

[2].?? R. Rivest, A. Shamir, L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, Vol.21, Issue.2, pp.120-126, 1978.

[3].?? William Stallings, “Cryptography and network security: Principles and Practices,” Pearson Education India, 7th edition, 2009.

[4].?? H. Mohan, and R. Raji, “ Performance Analysis of AES and MARS Encryption Algorithms,” ?International Journal? Computer Science Issues (IJCSI), Vol.8, Issue.4, 2001.

[5].?? Shivlal Mewada, Pradeep Sharma, S. S. Gautam, “Exploration of efficient symmetric AES algorithm, “. IEEE Symposium on Colossal Data Analysis and Networking (CDAN):), Indore,pp(1-5), 2016.

[6].?? Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Classification of Efficient Symmetric Key Cryptography Algorithms,” International Journal of Computer Science and Information Security (IJCSIS) USA, Vol.14, Issue.2, pp.105-110, 2016.

[7].?? Shivlal Mewada, Sharma Pradeep, Gautam S.S., “Exploration of Efficient Symmetric Algorithms,” IEEE 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).? pp(663?–?666), 2016.

[8].?? ShaligramPrajapat, Aditi Thakur, Kajol Maheshwari and Ramjeevan Singh Thakur, “Cryptic Mining in Light of Artificial Intelligence” International Journal of Advanced Computer Science and Applications(IJACSA), Vol.6, Issue.8, 2015..

[9].?? Shaligram Prajapat, Ramjeevan Singh Thakur, “Key Diffusion Approach for AVK based Cryptosystem,” In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies ICTCS-16?published by ACM. 78, 2016.

[10].Shaligramprajapat, R. S. Thakur, “Realization of information exchange with Fibo-Q based Symmetric Cryptosystem.,” International Journal? Computer Science and Information Security, IJCSIS, Vol.14, Issue.2, pp.216-223, 2016.

[11].Prajapat, Shaligram, Ramjeevan Singh Thakur, “Markov Analysis of AVK Approach of Symmetric Key Based Cryptosystem. In proceedings of Computational Science and Its Applications,” Springer International Publishing. pp. 164-176, 2015.

[12].ShaligramPrajapat, Ramjeevan Singh Thakur,? “Various Approaches Towards Crypt analysis,” International Journal of Computer Applications, Vol.127, Issue.14, 2015.

[13].Prajapat, Shaligram, Ramjeevan Singh Thakur, “Optimal Key Size of the AVK for Symmetric Key Encryption,” In Covenant Journal of Information & Communication Technology, Vol.3, Issue.2,? pp. 71-81. (2015)

[14].Shivlal Mewada, Aarti Shrivastava, Pradeep Sharma, N Purohit and S.S. Gautam, “Performance Analysis of Encryption Algorithm in Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.83-89, 2014.

[15].NidhiSinghal, J.P.S.Raina, “Comparative Analysis of AES and RC4 Algorithms for Better Utilization,”? International Journal Computer Trends and Technology, Vol.1, Issue.3, pp.117-181, 2011.

[16].Neha Joshi, Megha Singh, Surabhi Shah. A New Encryption Algorithm to Increase Performance & Security through Block Cipher Technique.? International Journal of Engg. Science and management, Vol.5, Issue.4, pp.73-78, 2015.

[17].S KTripathi, UK Lilhore, “An Efficient Block Cipher Encryption Technique Based on Cubical Method and Improved Key,” I. J. Interdisciplinary Research, Vol.2, Issue.6, pp.373-377, 2016.

[18].Raghu M E and Ravi Shankar K C, “Application of Classical Encryption Techniques for Securing Data- A Threaded Approach,”? International Journal Cybernetics & Informatics (IJCI), Vol.4, Issue. 2, pp.125-132, 2015.

[19].P. Gope, A. Singh, A Sharma and N. Pahwa, “An Efficient Cryptographic Approach or Secure Policy Based Routing. IEEE Journal on Selected Areas in Communications, ?Vol.1, pp.359-363, 2013.

[20].L. Buttyan, L. Czap and I. Vajda, “Detection and Recovery from Pollution Attacks in Coding Based Distributed Storage Schemes,” IEEE Transaction on Dependable and Secure Computing, Vol.8, Issue.6, pp. 824-838, 2011.

[21].S. F. Mare, M. Vladutiu and L. Prodan, “Secret data communication system using Steganography, AES and RSA,” IEEE: International Symposium for Design and Technology in Electronic Packaging, Vol.2, pp. 339-344, 2011.

[22].S. Verma, R. Choubey and R. Soni, “An Efficient Developed New Symmetric Key Cryptography Algorithm for Information Security,”? International Journal? Emerging Technology and Advanced Engineering, Vol.2, Issue.7, pp.18-21, 2012.

[23].RanjeetMasram, Vivek Shahare, Jibi Abraham, RajniMoona. Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based On Various File Features, International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, pp. 43-53, July 2014.

[24].S. Soni, H. Agrawal, M. Sharma, “Analysis and comparison between AES and DES Cryptographic Algorithm. International Journal of Engineering and Innovative Technology, Vol.2, Issue.6, pp.362-365, 2012.

[25].NidhiSinghal and J.P.S.Raina, “Comparative Analysis of AES and RC4 Algorithms for Better Utilization,” International Journal of Computer Trends and Technology, Vol.2, Issue.6, pp.177-181, 2011.

[26].Jawahar Thakur et. Al., “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Vol.1, Issue.2, pp.6-12, 2011.

[27].Kofahi, N.A, Turki Al-Somani, Khalid Al-Zamil, “Performance evaluation of three Encryption/Decryption Algorithms”, IEEE 46th Midwest Symposium on Circuits and Systems, Vol. 2, Issue.1, pp.790-793, 2003.

[28].Y. Jha, K. Kaur and C. Pradhan, “Improving image encryption using two-dimensional logistic map and AES," 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, Tamilnadu, India, pp-0177-0180, 2016.

[29].M. Kurt Pehli̇vanoğlu and N. Duru, Encryption of Walsh Hadamard Transform applied images with the AES encryption algorithm," 2016 24th Signal Processing and Communication Application Conference (SIU), Zonguldak, pp. 301-304, 2016.

[30].Q. Zhang and Q. Ding, “Digital Image Encryption Based on Advanced Encryption Standard (AES)," 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control, ?Qinhuangdao, pp.1218-1221, 2015.

[31].K. Aggarwal, “Comparison of RC6, modified RC6 & enhancement of RC6," 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, pp-444-449, 2015. ?

[32].Dadhich, A.; Gupta, A.; Yadav, S..Swarm, “Intelligence based linear cryptanalysis of four-round Data Encryption Standard algorithm”, IEEE:International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp: 378 – 383, 2014.

[33].Alabaichi, A.,?Ahmad, F., Mahmod, R., “Security analysis of blowfish algorithm”, IEEE: 2nd International Conference on Informatics and Applications (ICIA-13), pp.12– 18, 2013.

[34].TingyuanNie, Teng Zhang, “A study of DES and Blowfish encryption algorithm”, IEEE Region 10 Conference, pp.1-4, 2009.

[35].G. Catalini, F. Chiaraluce, L. Ciccarelli, E. Gambi, P. Pierleoni and M. Reginelli, “Modified twofish algorithm for increasing security and efficiency in the encryption of video signals," Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429), 1:I-525-8, 2003.

[36].A. O. Montoya B., M. A. Muñoz G. and S. T. Kofuji, “Performance analysis of encryption algorithms on mobile devices," 2013 47th International Carnahan Conference on Security Technology (ICCST), Medellin,? pp. 1-6, 2013..

[37].H. K. Verma and R. K. Singh, “Enhancement of RC6 block cipher algorithm and comparison with RC5 & RC6," 2013 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, pp. 556-561, 2013.

[38].S. Mewada, P. Sharma, and S. S. Gautam, “Investigation of Efficient Cryptic Algorithm for Text using SM Crypter,” International Journal of Information Science and Computing, Vol.3, Issue.2, pp. 99-108, 2016.