An Enhanced Text to Image Encryption Technique using RGB Substitution and AES
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 5
Abstract
In network security applications, before transmitting data to a remote machine it is encrypted at the sender side using any standard encryption algorithm. Most of the encryption algorithms make use of secret key without which it becomes very difficult to retrieve the actual data In this paper we propose a method which at first transforms the text into an image using an RGB substitution, and then encrypts the resulting image using AES Algorithm, under this approach, the secret key is smartly sent along with the cipher text in a single transmission, thus it also solves the key exchange problem that generally arises in most of the encryption models. The encryption and decryption process make the use of a combination database for text to image transformation. This paper is divided into following four sections; in section- I, we presented basic introduction of Network Security, in section-II, a survey on related algorithms has been presented, section-III discusses the proposed model and section IV concludes the paper
Authors and Affiliations
Sourabh Singh1 , Anurag Jain
Study of Security Problem in Cloud
The cloud computing has revolutionized the world in terms of services provided by it. But there are security problems of this cloud structure. This paper focuses on the security problems in cloud and various security mea...
Spectrum Sensing Techniques and Issues in Cognitive Radio
In present day communication wireless communication has become the most popular communication. Because of this growing demand on wireless applications has put a lot of constraints on the available radio spectrum...
Design of Convolutional Codes for varying Constraint Lengths
Convolutional codes play a vital role in wireless communication with the increase in usage of low-latency applications operating at high data rates. As the current technologies demand high data rates, the de...
A Review: Optimization of Energy in Wireless Sensor Networks
Wireless Sensor Networks have become an important research topic in last year. WSN is a collection of tiny, large number of densely deployed sensor node; these sensor nodes are smart, effective which is very powerf...
ANALYSIS AND IMPLEMENTATION OF SOFT-DECISION DECODING ALGORITHM OF LDPC
Low-density parity-check (LDPC) codes are freeware codes designed by Gallager in the year 1993 and used in most of the CDMA technology. An approach to study and analyze a mathematical model of belief propagation al...