A Novel Image Encryption/Decryption Scheme via Amended 4 out of 8 Code and Chaos Map


Authors : Anmol Pant; Sarvesh Kaushik

Volume/Issue : Volume 7 - 2022, Issue 1 - January

Google Scholar : http://bitly.ws/gu88

Scribd : https://bit.ly/3tPHLTI

DOI : https://doi.org/10.5281/zenodo.5890463

Abstract : Information hiding has been on an ascent lately. New steganography strategies have evolved to make our data more secure and thereby enhance privacy. With the development of information technology, images have now become the center of network information transmission and has replaced text. But as images are now being increasingly used, there has also been an evolution in image information theft technology. To keep pace with the progressing theft technology, we must look for more efficient encryption procedures so as to further enhance our security prospects. The 4 out of 8 code image encryption techniques deploys transporter or carrier picture creation for encryption. Here the carrier image is made with the help of alphanumeric key phrase that is associated with each image. Each alphanumeric key will have its own unique 8-character bit value created by cutting edge 4 out of 8 code. This recently delivered carrier image is added with the actual image that we want to hide, to get the encoded picture. The opposite technique results the decoded picture. So as to further improve the protection from cyber assaults we even incorporate a cryptographic function which gives authenticity and security to the secret key produced which is to be given to the receiver so as to decode the encrypted image.

Keywords : Amended 4 out of 8 code, carrier image, image encryption, file management system, cipher image, cryptography

Information hiding has been on an ascent lately. New steganography strategies have evolved to make our data more secure and thereby enhance privacy. With the development of information technology, images have now become the center of network information transmission and has replaced text. But as images are now being increasingly used, there has also been an evolution in image information theft technology. To keep pace with the progressing theft technology, we must look for more efficient encryption procedures so as to further enhance our security prospects. The 4 out of 8 code image encryption techniques deploys transporter or carrier picture creation for encryption. Here the carrier image is made with the help of alphanumeric key phrase that is associated with each image. Each alphanumeric key will have its own unique 8-character bit value created by cutting edge 4 out of 8 code. This recently delivered carrier image is added with the actual image that we want to hide, to get the encoded picture. The opposite technique results the decoded picture. So as to further improve the protection from cyber assaults we even incorporate a cryptographic function which gives authenticity and security to the secret key produced which is to be given to the receiver so as to decode the encrypted image.

Keywords : Amended 4 out of 8 code, carrier image, image encryption, file management system, cipher image, cryptography

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe