A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: Now a day with incredible change in social media network such as mobile communication and computer, all type of a data such as audio, video, images are used for the communication .Privacy for that data is an important issue .Cryptography is one of the technique used for stopping unauthorized access andincreasing integrity of that data. In this research encryption and decryption scheme is used based on image pixel shuffling and transposition. We can use cipher algorithm for generating key using RGB values of the pixel. For that purpose we use m*n size image on which different operations are performed. This algorithm was implemented in java language.
Authors and Affiliations
Swapnali Krushnarao Londhe. , , Megha Dilip Jagtap. , , Ranjeet Ravindra Shinde. , P. P. Belsare
Towards Web 3.0: An Application Oriented Approach
The World Wide Web (WWW) is global information medium, where users can read and write using computers over internet. Web is one of the services available on internet. The Web was created in 1989 by Sir Tim...
A Cost Estimation of Maintenance Phase for Component Based Software
Cost estimation of maintenance phase is necessary to predict the reliability, improve the productivity, project planning, controlling and adaptability of the software. Accurate estimation makes good understanding...
Bluetooth Messenger: an Android Messenger app based on Bluetooth Connectivity
Abstract: The project discussed here is an Android messenger application which connects using Bluetooth. The main concepts discussed here are : i) Bluetooth connection between two or more android smart phones, wher...
The Impact of E-marketing on Commercial Banks in Harare, Zimbabwe (1994 -2014).
Abstract: The purpose of this study was to analyse the effects of e-marketing on commercial banks between 1994 and 2014. The researchers dwelt on the adoption of e-marketing services in the commercial banks. The adoption...
Enhancing Micro-ATMs and POS Terminals Authentication System Using AdvancedBiometric Techniques
Most of the transactions at the Point of Sale (POS) terminals are carried out by payments through Credit or Debit cards.Many leading banks have started the door step banking service with the help of microATM device.The c...