Image Encryption Using Hash Function and Entropy Function
Keywords:
Image Encryption, Image Decryption, Cryptography, Entropy, Information measureAbstract
In this paper, two way security is purposed; in which the first part of the algorithm presents the image encryption based on MD5 Hash function and in the second part we use the entropy function. The distinct characteristics of the algorithm are : high security, high sensitivity and high speed that can be applied for encryption of gray-level and color images. The hash function performs the partial encryption. The Entropy function generates a key that helps jumble the information. Both security and performance aspects of the proposed algorithm are analyzed and satisfactory results are obtained.
References
K H Rosen, Elementary Number Theory and Its Applications, Pearson,New York 1984.
Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, 27 (1948) 379-423.
Madasu Hanmandlu, Anirban Das, Content-based Image Retrival by Information theoretic Measure, Defence Science Journal, 61 (2011) 415-430.
J J Rissanen and G G Langdon, Arithmetic Coding, IBM Journal of Research and Development, 23 (1979) 146-162.
Gwo-Ruey Yu, Dept. of Electr. Eng., I-Shou, "Secure communication using chaotic Synchronization and international data encryption algo-rithm", Proceedings of American Control Conference, 5 (2004) 4319-4324.
Nithin Nagaraj, Prabhakar G Vaidya, Kishor G Bhat, Joint Entropy Coding and Encryption using Robust Chaos, Front for the arXiv,nlin.CD/0608051, 2006.
Y. L Bel'skii, and A. S. Dimitriev, Information transmission determin-istic chaos Radiotekh, Electron, 38 (1993) 1310-1215.
Ajeesh P. Kurian, Sadasivan Puthusserypady, Secure Digital Communi-cation using Chaotic Symbolic Dynamics, Turk J Electrical Engineering,14 (2006).
Ritika Goel, Madasu Hanmandlu, Cryptography Using Information Theoretic Measure, National Conference on Current Trends in IT, Kru-jpal University, (2007) 247-252.
Ch Samson, V U K Sastry, An RGB Image Encryption Supported by Wavelet-based Lossless Compression. IJACSA, 3 (2012) 36-41.
H T Panduranga, S K Naveen Kumar, Advanced Partial Image Encryp-tion using Two- Stage Hill Cipher Technique. International Journal of Computer Applications, 60 (2012) 14-19.
V. Gopalakrishnan, T. Purusothaman, Enhancing security through compressing, randomized encryption and authentication. ICGST-CNIR Journal, 5 (2006).
Benyamin Norouzi,Seyed Mohammad Seyedzadeh, Sattar Mirza-kuchaki,Mohammad Reza Mosavi, A novel image encryption based on Hash function with only two-round diffusion process, Springer Verlag Berlin Heidelberg, Multimedia System 20(1) (2014) 45-64 .
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.