Blowfish Encryption Using Key Secured Block Based Transformation

Abstract

 Encryption is a process of converting a one form of information in another form which is hard to understand .Now a days, a large amount of information get transfer with wired or wireless network. Information contents may be textual data or image data. Therefore encryption of text or image is most important during secure transmission of information. Images are widely used in several processes like military field, medical imaging, video conferencing where confidentiality about image information is very important. As we know, pixels in plain image are strongly correlated. Image information get perceive due to this high correlation. Most of available image encryption algorithms are used for encryption of pixel information only but key secured block based transformation technique change the position of pixels and provide low correlation among image pixels so that less amount of information get perceived . The block transformation algorithm divides the image in to no. of blocks and shuffles their position of blocks to decrease the Correlation and increase its entropy value. Divide an image in more no. of blocks gives the more security of image. Transformation table will decide new positions of blocks. The aim of Key secured block transformation is to enhance the security of an image. Here, key provide a security for transformation table .Different keys generated for different types of image so ,if input image data changed automatically key will also get change. Here key is used for two purposes, one for to build transformation table and second to encrypt image data. So as key changed, transformation table will also get change and image get transformed with this new transformation table. Block Transformed image is then passed for encryption process. Here we used Blowfish image encryption algorithm because of variable and longest key size. At the receiver side these blocks are retransformed in to their original position and performed a decryption process which gives the original image.

Authors and Affiliations

Mrs. Dhanashri M. Torgalkar

Keywords

Related Articles

DETECTION OF DIABETIC PRESENCE FROM IRIS BY USING SUPPORT VECTOR MACHINE

This is a simple and non-intrusive method to detect diabetic in body and iris recognition is not only mainly for biometric identification but it can also be used as a mean to detect diabetic or maybe diagnose any diseas...

PERFORMANCE CHARACTERISTICS OF A FOUR STROKE COMPRESSION IGNITION ENGINE BY VARYING DIAMETER OF THE INTAKE MANIFOLD

In automobiles an intake manifold is a part of engine that supplies and evenly distributes the air to the cylinder. The rate of airflow through an internal combustion engine is an important factor determining the amo...

 A PAPER ON A COMPARATIVE STUDY BLOCK TRUNCATING CODING, WAVELET, FRACTAL IMAGE COMPRESSION & EMBEDDED ZERO TREE

 Many different image compression techniques currently exist for the compression of different types of images. Image compression is fundamental to the efficient and cost-effective use of digital imaging technology a...

NUMERICAL STUDY ON HEAT TRANSFER OF TURBULENT DUCT FLOW THROUGH RIBBED DUCT

Ribs have been used as a tool to enhance heat transfer by increasing the level of turbulence mixing in the flow. Enhancing heat transfer surface are used in many engineering applications such as gas turbine blade coolin...

 Speech Operated System using DSP: A Review

 Speech is the most basic, common and efficient form of communication method for people to interact with each other. Today, speech technologies are commercially available for an unlimited but interesting range of t...

Download PDF file
  • EP ID EP95443
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

Mrs. Dhanashri M. Torgalkar (30).  Blowfish Encryption Using Key Secured Block Based Transformation. International Journal of Engineering Sciences & Research Technology, 3(3), 1774-1780. https://europub.co.uk/articles/-A-95443