A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6

Abstract

Abstract: Now a day with incredible change in social media network such as mobile communication and computer, all type of a data such as audio, video, images are used for the communication .Privacy for that data is an important issue .Cryptography is one of the technique used for stopping unauthorized access andincreasing integrity of that data. In this research encryption and decryption scheme is used based on image pixel shuffling and transposition. We can use cipher algorithm for generating key using RGB values of the pixel. For that purpose we use m*n size image on which different operations are performed. This algorithm was implemented in java language.

Authors and Affiliations

Swapnali Krushnarao Londhe. , , Megha Dilip Jagtap. , , Ranjeet Ravindra Shinde. , P. P. Belsare

Keywords

Related Articles

 Buffer Overflow Attack

 - Exploits, vulnerabilities, and buffer-overflow techniques have been used by malicious hackers and virus writers for a long time. In order to attack and get the remote root privilege, using buffer overflow and...

Management Support System (Mss) In Higher Educational Institutions (Heis): University Of Jos, Nigeria. Ict Support

Abstract: Management support system is of great importance in the institutions of higher learning, as an interactive computer-base system that support cooperate memory or knowledge base that constitutes the problem-solvi...

An Efficient Face Tracker Using Active Shape Model

To perform tracking in an illumination insensitive feature space, called the gradient logarithm field (GLF) feature space. The GLF feature mainly depends on the intrinsic characteristics of a face and is only marginally...

Problem Domains in Complex Networks

Abstract: Many real world Networks can be represented with the help of complex networks. Complex networks are special graphs with non trivial topological properties—features that do not occur in simple networks such as l...

 Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique

 Data hacking is one of the challenging problems in Internet world. It is possible to greatly improve our understanding and also should provide security to network data. The most existing encryption algorithms desig...

Download PDF file
  • EP ID EP117502
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

Swapnali Krushnarao Londhe. , , Megha Dilip Jagtap. , , Ranjeet Ravindra Shinde. , P. P. Belsare (2015). A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition. IOSR Journals (IOSR Journal of Computer Engineering), 17(6), 8-11. https://europub.co.uk/articles/-A-117502