An Enhanced Text to Image Encryption Technique using RGB Substitution and AES
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 5
Abstract
In network security applications, before transmitting data to a remote machine it is encrypted at the sender side using any standard encryption algorithm. Most of the encryption algorithms make use of secret key without which it becomes very difficult to retrieve the actual data In this paper we propose a method which at first transforms the text into an image using an RGB substitution, and then encrypts the resulting image using AES Algorithm, under this approach, the secret key is smartly sent along with the cipher text in a single transmission, thus it also solves the key exchange problem that generally arises in most of the encryption models. The encryption and decryption process make the use of a combination database for text to image transformation. This paper is divided into following four sections; in section- I, we presented basic introduction of Network Security, in section-II, a survey on related algorithms has been presented, section-III discusses the proposed model and section IV concludes the paper
Authors and Affiliations
Sourabh Singh1 , Anurag Jain
Sensors based Wearable and Systems for Detection of Human Movement and Fall
Human computer interaction system is a study of relationship between people and computers mediated information. The future of human computer interaction systems lies in how intelligently these systems can take into accou...
Fuzzy Logic based user friendly Pico-Hydro Power generation for decentralized rural electrification
Pico-Hydro Power Plant (PHPP) is becoming one of the most important renewable energy sources in the world for remote or rural locations day by day. It does not encounter the problem of population displacement and i...
Performance Analysis of Various Vedic Techniques for Multiplication
Multiplication is an important factor in arithmetic operations and is carried out in a number of Digital Signal Processing applications. As Multipliers take a long time for execution so there is a need of fast mult...
Fly Ash (F-Class): Oppertiunities For Sustainable Development Of Low Cost Rural Roads
Fly ash, a waste derived from coal burning in thermal power plants is plentiful in India causing severe health, environment and dumping problems. It is estimated that about 150 million tons of fly ash are being pro...
Optimal Rescheduling of Generators for Congestion Management by using Godlike Algorithm
Congestion charges can be analyzed in both the cases. In a pool market mode, the sellers (competitive generators) may propose their rise and reduce bid prices in a real-time balancing market. Correspondingly, in the crat...