Encryption image binding with secret key

Abstract : Symmetric key cryptography is a common cryptographic technique using the same key at both the transmitter and receiver side. The main advantage of symmetric key encryption is its less computational cost compared to its counterpart-public key encryption. In this work a new symmetric key encryption scheme is proposed. Rather than using normal binary secret keys, our technique uses images as secret keys. Message letters are converted into their corresponding 8-bit binary codes. These 8-bit codes are scanned for image pixel values which are represented by the same 8-bit codes. When a match is found between the message 8-bit code and pixel values codes that location of the pixel is saved in a separate file. Instead of saving pixel locations as (x, y) coordinates, their locations are saved as one value column wise. After having all matches, pixels locations are transmitted as cipher text. The receiver side will scan the same image for those locations and will pick values at those locations which represent message codes. The main advantage of this scheme is its high security as its key size is very large.
 EXISTING SYSTEM :
 ? The signature identifies the image’s copyright information such as profile information, or an identification number and it is integrated within digital files as noise, or random information that already exists in the file, thereby making the detection and removal of the watermark difficult. ? If average throughput of encryption and decryption is considered, the proposed technique is much better than the existing symmetric key techniques. ? Execution time (Encryption + Decryption) of the proposed technique is compared with different existing symmetric encryption techniques. ? However, earlier findings of the research work discover that there exist certain key values that resulted in weak encryption.
 DISADVANTAGE :
 ? There are several issues that need to be concerned. Firstly, compression technique employs pattern library for encoding. ? The main objective of SIP was to overcome the weak key problem as well as to enhance the security strength of the algorithm. ? One of the drawbacks of DES is that the key length was too short. To overcome this problem DES was enhanced and 3DES was proposed. ? The main challenge of the research is to overcome the weak key problem, to extend the algorithm to support variable size images and to introduce electronic codebook (ECB) and cipher block chaining (CBC) mode of operations.
 PROPOSED SYSTEM :
 • As cryptographic keys are very long and has to be protected from unauthorized access, a new technique generating secret keys directly from image properties was proposed. • All images whose pixel values can represent all characters can be used as secret key. • Character probability is checked for any image that is to be used as secret key. • If the characters of the secret message are present in image in the form of pixel values, find the location of every character. • There can be multiple locations for one character, take any random location. After finding all the locations of characters, write these locations in a separate file.
 ADVANTAGE :
 ? In Symmetric key encryption or secret key encryption, only one key is used for both encryption and decryption. ? In study of different symmetric key algorithms is performed. Files of variable sizes and contents were encrypted and performance was measured. ? Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. ? Digital watermarking or also known as digital fingerprinting is another technique that is used for digital image protection. ? This technique inserts pattern of bits known as signature into a digital image, audio or video file.

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com