An Efficient Image Encryption Using Merkle-Hellman, Elgamal and Genetic Algorithm for Color Images

Article Preview

Abstract:

The proliferation of digitized media due to rapid growth of network multimedia systems has created an urgent need for information security due to the ever increasing unauthorized manipulation and reproduction of original digital data. In this paper an approach based on Merkle-Hellman, ElGamal and Genetic algorithms is proposed for data encryption and decryption. The strength of the cipher is increased further by using genetic algorithm. Experimental results show that the proposed approach can be implemented on images of any size which retain the quality of the image while retrieving the original image. This aspect helps in providing the reduction in block size without compromise in the quality of the image and security as well.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1140-1147

Citation:

Online since:

January 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Jayaraman, Esakkirajan And Veerakumar, Digital Image Processing, Tata Mcgraw Hill.

Google Scholar

[2] www. researchgate. net/.. Color_image.. /60b7d52b09895a746f. pdf.

Google Scholar

[3] William Stallings, Cryptography and Network Security, Principles and Practices, Fourth Edition, Pearson Education.

Google Scholar

[4] Bruce Schneier, Applied Cryptography, John Wiley & Sons (Asia) Pte Ltd, Isbn 9971-51-348-X.

Google Scholar

[5] Ashish Agarwal, Simon Fraser University, Encrypting Messages Using The Merkle-Hellman Knapsack Cryptosystem, Ijcsns Vol, 11 No. 5, May (2011).

Google Scholar

[6] Merkle, Ralph And Martin Hellman, Hiding Information And Signatures In Trapdoor Knapsacks, " Information Theory, Ieee Transactions On, Vol. 24, No. 5, Pp. 525-530, Sep 1978 Url: Http: /Ieeexplore. Ieee. Org/Search/Freesrchabstract. Jsp, Tp=&Arnu mber=1055927.

DOI: 10.1109/tit.1978.1055927

Google Scholar

[7] Shamir, Adi, A Polynomial-Time Algorithm For Breaking The Basic Merkle - Hellman Cryptosystem, " Information Theory, Ieee Transactions On, Vol. 30, No. 5, Pp. 699-704, Sep 1984 Url: Http: /Ieeexplore. Ieee. Org/Search/Freesrchabstract. Jsp, Tp=&Arnu mber=4568386.

DOI: 10.1109/tit.1984.1056964

Google Scholar

[8] crypto. stanford. edu/~dabo/papers/RSA-survey. pdf.

Google Scholar

[9] www. members. tripod. com/irish_ronan/rsa/attacks. html.

Google Scholar

[10] Behrouz A. Forouzan, Cryptography and Network Security, Tata Mcgraw Hill.

Google Scholar

[11] Goldberg D.E., Genetic algorithms in search optimization & Machine learning, Addison- Wesley, (1989).

Google Scholar

[12] www. merriampark. com\lcm. htm.

Google Scholar

[13] G. Lokeshwari, G. Aparna, Dr S. Udaya kumar, A Novel Scheme For Image Encryption Using Merkle-Hellman Knapsack Cryptosystem – Approach, Evaluation And Experimentation, International Journal of Computer Science And Technology (IJCST) Volume 2, Issue 4, Oct – December 2011 Pp. 344-348.

Google Scholar

[14] G. Lokeshwari, Dr S. Udaya kumar, G. Aparna Reliable Block based Cryptosystem: Combination of Merkle-Hellman and RSA for secured image Transmission, Computing and Convergence Technology (ICCCT), 2012 7th International Conference on 3-5 Dec. 2012 , Pp 626 – 630, Seoul, Korea, Print ISBN: 978-1-4673-0894-6.

Google Scholar

[15] Pranam Paul, Saurabh Dutta, A K Bhattacharjee, Enhancement of Security Through An Efficient Substitution- Based Block Cipher Of Bit-Level Implementation With Possible Lossless Compression, Vol. 8 No. 4 Pp. 318-326.

Google Scholar

[16] Gove Nitinkumar Rajendra, Bedi Rajneesh kaur A New Approach for Data Encryption using Genetic Algorithms and Brain Mu Waves , International Journal Of Scientific And Engineering Research Volume 2, Issue 5, May-2011 ISSN 2229-5518.

Google Scholar