Title :
An efficient and effective lossless symmetric key cryptography algorithm for an image
Author :
Kumar, Narendra ; Agrawal, Sanjay
Author_Institution :
Dept. Comput. Eng. & Applic., NITTTR, Bhopal, India
Abstract :
Modern era is fully dependent on internet communication. Through internet we can transfer data anywhere in the world. The Internet was born of academic efforts to share information; it never strove for the high security process. It plays a vital role in becoming people online, it is easy and effective but dangerous too in terms of data hacking and cracking by hackers. It is needed that while using Internet data must be secured and personal. Encryption can be used to protect data during transmission. Image encryption is a suitable process to protect image data. There are many cryptographic algorithms which are being used to secure multimedia data like images, but they have some advantages and disadvantages. So there is a requirement to develop a strong cryptography algorithm for securing the image while transferring. In this paper, a new symmetric key cryptography algorithm is proposed here for color 3D images. In this algorithm a different type of key generation method is being used. This technique is unique for key generation. Here two public key is the use of cryptography process. Key generation is very important in symmetric as well as in the asymmetric key cryptographic algorithm. Here, the proposed work of developing a new symmetric key cryptography algorithm for image data to provide a secure transmission during the network communication. All the concepts related to this research area are explained. This algorithm reduces lossless of image pixel during encryption and decryption.
Keywords :
Internet; cryptography; image processing; Image encryption; Internet communication; Internet data; data cracking; data hacking; effective lossless symmetric key cryptography algorithm; image data protection; image pixel; key generation method; multimedia data; security process; Abstracts; Biomedical imaging; Chaotic communication; Classification algorithms; Computer crime; Cryptography; Decryption; Encryption; Histogram; Image Cryptography; MATLAB;
Conference_Titel :
Advances in Engineering and Technology Research (ICAETR), 2014 International Conference on
Conference_Location :
Unnao
DOI :
10.1109/ICAETR.2014.7012788