Professional Documents
Culture Documents
Dr. D. M. Shah, Reader, G.H.Patel Post Graduate Department of Computer Science and Technology Sardar Patel University, Vallabh Vidyanagar 388 120 (Gujarat, INDIA) ABSTRACT Internet based communications are evolving at a tremendous rate. Encryption of data has become an important way to protect data resources especially on the Internet, intranets and extranets. Encryption involves applying special mathematical algorithms and keys to transform digital data into cipher code before they are transmitted and decryption involves the application of mathematical algorithms and keys to get back the original data from cipher code. The goal of security management is to provide authentication of users, and integrity, accuracy and safety of data resources. Moreover, an image-based data requires more effort during encryption and decryption. The model for encryption and decryption of an image using suitable user-defined key is developed with the same objective.
1.
Considerations of privacy and confidentially in a computer environment have given recognition to the need for protecting certain communications and stored data from theft and misuse. A suitable methodology for protecting communicated or stored data involves the use of cryptographic techniques. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. [06] A message is plaintext. The process of disguising a message in such a way as to hide its substance is encryption. An encrypted message is ciphertext. The process of turning ciphertext back into plain text is decryption.[05]. Basic operations that can be carried out in encryption/decryption are: substitution and transposition. Due to advent of computers, these operations are carried out on binary bits.[04] The Internet has facilitated the development of a worldwide Virtual Community free from the constraints of time and geography. Due to the Internet there is no distance between a person located in one place and experts around the globe. Through electronic mail / voice mail / video mail it is possible to solicit the opinion of experts. Moreover, Telemedicine is becoming popular in the specialties of radiology, pathology, critical care and psychiatry, where data is in the form of image. It is required to ensure confidentiality and security for transmitting certain image-based data over the Internet. The aim of security management is to provide authentication of users and integrity, accuracy & safety of data resources. The model for encryption & decryption of an image is designed with the same purposes.
2. OBJECTIVES
The model for encryption and decryption of an image is designed with the objectives to have confidentiality and security in transmission of the image based data as well as storage in the data warehouse, with the help of suitable user-defined key.
3. ARCHITECTURE
For encryption and decryption a symmetric key model has been used. The architecture of image encryption and decryption model is described in Figure 1: Image Image Encryption Model
Figure 1 : The Architecture Figure - 4 of the Image Encryption and Decryption Model
In addition, one extra row is added to the end of the result image. The first pixel in this row contains the length k of the key in encrypted form. Next k pixels store the characters of the key in encrypted form. Both of these are encrypted using the same key as that supplied by the user. That is, Encrypted key = encryptkey key The rest of the pixels in this row are filled with random values.
7. FEATURES
An image encryption and decryption model uses user-defined key in generating cipher code from an image. Hence, the same image may have different cipher codes, depending on the key supplied by the user.
8. CONCLUSION
The image encryption and decryption model is designed and implemented to provide confidentiality and security in transmission of the image based data as well as in storage in the data warehouse, with the help of suitable user-defined key.
REFENRENCES
[01] Earl Gose, Richard Johnsonbaugh And Steve Jost: Pattern Recognition And Image Analysis, PHI, 1999. [02] [03] Anil K. Jain: Fundamentals Of Digital Image Processing, PHI, 1997. Harry Katzan, Jr.: The Standard Data Encryption Algorithm, Petrocelli Books, Inc, 1977. [04] Ranjan Bose: Information Theory Coding and Cryptography, Tata McGrawHill Publishing company Limited.(2002) [05] [06] Bruce Schneier: Applied Cryptography, replica press Pvt Ltd. (2001) Alfred menezes, Paul C. van Oorschot and Scott A. Nanstone: Handbook of Applied Cryptography, CRC press LLC (1997)