Abstract—This paper involves the work done in the field of development of secure and better cryptographic algorithms for digital data like images. The paper presents a technique and its application in binary plane decomposition and two image encryption schemes. One scheme is simple and other provides high security. This proposed work achieves lossless image encryption. The paper has been carried out by dividing into five subsections: i) Introduction, ii) Literature Review iii) Proposed Methodology iv) Simulation Results v) Conclusion.
Index Terms—Visual Cryptography (VC), Bit Planes, Secret Sharing.
Introduction
Cryptography may be defined as the process of enciphering data using mathematical model or algorithm, before transmission and then deciphering the obtained data from channel using a model which works in reverse manner to the encipher thereby allowing a person to transmit information across networks so that it cannot be interpreted by any undesired means. Also it is worth mentioning that Cryptanalysis deals with analysis of data and breaking encrypted communication without acquiring attention of actual sender or receiver.
Terminology
The Following section introduces some basic terms or definitions in the field of Cryptography. These are as follows
Plain-Text: The original or source message which contains the actual information to be transmitted over the communication channel.
Cipher-Text: The enciphered message obtained from Plain-Text which appears as valueless
Encryption is a method of encoding a message or information before sending it, so unauthorized users can’t access it without permission and only the person who has authorised access to it can decode it. Encryption is used to keep things secure and keep things confidential within the organisation. For example let’s say you have a chat with a friend on Skype, when you’re sending a message to him, that message will display as random symbols until he receives it, which then decodes it and makes it so that only he can read it. This allows the communication to be secure and private, no one will be able to know what the message says.
According to the Newton's Telecom Dictionary, cryptography is, "the process of concealing the contents of a message from all except those who know the key," (207). It is also defined as ". . . the science, or art, of secret writing," (Huffman 2). The word "cryptography" originated
The original text or message used in communication in called as Plain text. Foreg. Hello world is an example of a simple plain text.
The practice and study in securing communication between parties in presence of potential adversaries. A cryptographic algorithm or cipher is a mathematical function used in a plaintext in the encryption and decryption process. A cryptographic algorithm works in combination with a key (number, word, or phrase) to encrypt the plaintext. The same plaintext also encrypts to different cipher text with the use of different keys. The core of modern cryptography is the construction and analyzation of protocols of various aspects in information security such as data integrity and confidentiality, authentication, and non-repudiation.
Key: It is the information used to decrypt the data known only by sender and receiver
Over the years, cryptography has been used to protect secrets, in a military capacity to make sure that either hackers, enemies of the countries, do not intercept sensitive formation. Ciphers, and encryption blocks are becoming so hard to break even the best super computers cannot break the codes in a timely fashion. Encryption has been improved over the years, also has been around for thousands of years and this paper is intended to explain about different forms of cryptography that either has been used or is still in use to this day. This paper is about
In today’s world information security is extremely important; this is due to the fact that everything in everyone’s daily life is somehow connected to the internet in one way or another. It is of the upmost importance that the information stored on servers throughout the world be protected at all times. Globally, people of all walks of life have personal information stored on servers, whether it be banking information, social media information, phone numbers, addresses, etc. all of this personal information must be secured. The basic concepts of securing data would lie within the CIA triad. The CIA Triad stands for confidentiality, integrity and accessibility. With confidentiality, this ensures that the data be encrypted and not made available to an unauthorized individual. Integrity of information means that the data be accurate and not allowed to be changed in any way without proper credentials, this ensures the data stays intact without mishandling or corruption. Lastly, accessibility is making sure the data can be retrieved by an authorized individual in a dependable and timely manner also, to ensure the information systems are reliable.
Communication can be defined as information transfer.This can be exchange of thoughts,messages,feelings.The way we transfer information is by speech,signals or writing ,to express oneself in such a way that one is really and clearly understood.We all use a variety of communication techniques to both understand and be understood.Without communication nothing would get done,no information
Cryptography simply means to encrypt your message into something else so that nobody can read it that is not authorised to read the information. Only that person can
Data encryption is the key role in current and future technologies. Many public key cryptography algorithms were presented depending on a specific mathematical problem. It is desired to communicate data with high security over insecure network. Due to sensor technology biometrics has lead to rising concerns about the network security, privacy, trust issues and accuracy. Hence, securing biometric template in public network is great challenge. Because once it is compromised or stolen it cannot be revoked. In order to provide remote biometric authentication these systems incorporated with cryptography and primarily focused on template security, revocability, privacy, accuracy. The system is secure in the sense that the biometric are going to
Author in [17] introduced a new combined cryptographic method called TTJSA. In this work, authors modified the standard Vernam Cipher Method for all characters (ASCII code 0-255) with randomized keypad, and have also introduced a feedback mechanism.
Cryptography is the technique of providing secured communication in the presence of third parties. It is mostly use between individuals, military forces As we know there are various aspects which are important in information security such as confidentiality, data integrity, authentication and one important thing is that there should be assurance form the third party to contract and they should not deny of the authentication of their signature on any document so, all these are the vital part of the cryptography.
Some data is very sensitive and therefore it has to be hidden away from parties who are not supposed to view it. In this age of computers, their capacity for transfer and retrieval of information may be exploited by other parties to gain access to confidential and potentially dangerous data. Therefore, measures have been taken to ensure that data is not accessed by others which is done by using several methods which, besides physical security, includes the use of encryption algorithms which are programs that change the way information looks by rendering it illegible.
Public key cryptography is also known as asymmetric cryptography. Public key cryptography is dependent upon cryptographic algorithms which are based on mathematical problem. In Public key cryptography there are two keys public key and private key. Public key is a mathematical code which is known to all i.e. it is widely known. Private key is also a mathematical code but is known only to proprietor. There are many algorithm used for public key cryptography some of them are discussed below.
Basically, public-key digital signature schemes are successfully classified into many major types depending on the NP mathematical hard problem. These problems are the integer factorization problem (IFP), the discrete logarithm problem (DLP), the Elliptic Curve discrete logarithm problem (ECDLP), the chaotic maps hard problem In the present e-commerce and e-government era, digital signatures have become more and more important