Password-oriented Image Encryption with multiple dependent factors.

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: The goal of this project was to develop a password-based image encryption algorithm that would be virtually safe from brute-force attacks, resulting in an image that would have no recognizable pattern. The algorithms designed were implemented in a java program. To increase the security of the algorithm, dual encryption keys generated based on the user’s password are used and have an increased number of factors dependent upon the password. Apart from the pixel values, the location of pixels and the number of cycles of encryption, which the image will undergo, are also based on the password entered.

Authors and Affiliations

Ishaan Agarwal

Keywords

Related Articles

 Client-Server Model

 Client- server is a system that performs both the functions of client and server so as to promote the sharing of information between them. It allows many users to have access to the same database at the same time...

An Efficient Methodology for Clustering Uncertain Data Based on Similarity Measure

Abstract: In data mining clustering is one of the most important and crucial task. There exists various clustering techniques like partitioning and density based techniques. The previous methods worked on traditional par...

 Off – Line Optimization of Strategic and Design Parameters of a Hybrid Stand-Alone Wind/Solar/Fuel Cell/Battery System

 Abstract: Energy management strategy governs the performance and efficiency of the system. This paper reports the use of an innovative strategy that implements monthly power split parameters to decide the division...

 Fast Remote data access for control of TCP/IP network using android Mobile device

 Abstract: In today’s world most of the mobile have the use more than its basic functionality. As mobile becomes more advance to be have same architecture same as desktop system. Hence this feature should be used as...

 An Optimal Approach to derive Disjunctive Positive and Negative  Rules from Association Rule Mining using Genetic Algorithm

 Mining frequent itemsets and association rules is a popular and well researched approach for discovering interesting relationships between variables in large databases. Association rule mining is one of the &nbsp...

Download PDF file
  • EP ID EP163091
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Ishaan Agarwal (2014).  Password-oriented Image Encryption with multiple dependent factors.. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 1-3. https://europub.co.uk/articles/-A-163091