Image Encryption Using Hash Function and Entropy Function

Authors

  • Hanmandlu M Dept. of Electrical Engg. IIT, Delhi
  • Meena G Dept. of Electrical Engg. IIT, Delhi
  • Vishwakarma N Dept. Of Computer Engg., NMIMS MPSTME, Shirpur

Keywords:

Image Encryption, Image Decryption, Cryptography, Entropy, Information measure

Abstract

In this paper, two way security is purposed; in which the first part of the algorithm presents the image encryption based on MD5 Hash function and in the second part we use the entropy function. The distinct characteristics of the algorithm are : high security, high sensitivity and high speed that can be applied for encryption of gray-level and color images. The hash function performs the partial encryption. The Entropy function generates a key that helps jumble the information. Both security and performance aspects of the proposed algorithm are analyzed and satisfactory results are obtained.

References

K H Rosen, Elementary Number Theory and Its Applications, Pearson,New York 1984.

Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, 27 (1948) 379-423.

Madasu Hanmandlu, Anirban Das, Content-based Image Retrival by Information theoretic Measure, Defence Science Journal, 61 (2011) 415-430.

J J Rissanen and G G Langdon, Arithmetic Coding, IBM Journal of Research and Development, 23 (1979) 146-162.

Gwo-Ruey Yu, Dept. of Electr. Eng., I-Shou, "Secure communication using chaotic Synchronization and international data encryption algo-rithm", Proceedings of American Control Conference, 5 (2004) 4319-4324.

Nithin Nagaraj, Prabhakar G Vaidya, Kishor G Bhat, Joint Entropy Coding and Encryption using Robust Chaos, Front for the arXiv,nlin.CD/0608051, 2006.

Y. L Bel'skii, and A. S. Dimitriev, Information transmission determin-istic chaos Radiotekh, Electron, 38 (1993) 1310-1215.

Ajeesh P. Kurian, Sadasivan Puthusserypady, Secure Digital Communi-cation using Chaotic Symbolic Dynamics, Turk J Electrical Engineering,14 (2006).

Ritika Goel, Madasu Hanmandlu, Cryptography Using Information Theoretic Measure, National Conference on Current Trends in IT, Kru-jpal University, (2007) 247-252.

Ch Samson, V U K Sastry, An RGB Image Encryption Supported by Wavelet-based Lossless Compression. IJACSA, 3 (2012) 36-41.

H T Panduranga, S K Naveen Kumar, Advanced Partial Image Encryp-tion using Two- Stage Hill Cipher Technique. International Journal of Computer Applications, 60 (2012) 14-19.

V. Gopalakrishnan, T. Purusothaman, Enhancing security through compressing, randomized encryption and authentication. ICGST-CNIR Journal, 5 (2006).

Benyamin Norouzi,Seyed Mohammad Seyedzadeh, Sattar Mirza-kuchaki,Mohammad Reza Mosavi, A novel image encryption based on Hash function with only two-round diffusion process, Springer Verlag Berlin Heidelberg, Multimedia System 20(1) (2014) 45-64 .

Downloads

Published

2024-02-26

How to Cite

Hanmandlu, M., Meena, G., & Vishwakarma, N. (2024). Image Encryption Using Hash Function and Entropy Function. COMPUSOFT: An International Journal of Advanced Computer Technology, 5(07), 2191–2196. Retrieved from https://ijact.in/index.php/j/article/view/381

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.