Cumulative Image Encryption Approach

Authors

  • Das R Development Officer, Bankura University, Bankura-722155, W.B., India
  • Dutta S Department of Computer Applications, Dr. B. C. Roy Engineering College, Durgapur-713206, WB, India.

DOI:

https://doi.org/10.26438/ijcse/v6i5.170177

Keywords:

Secret Sharing, Human Visual System, Image Key Encryption Technique, BWM&AS Operation

Abstract

Secret sharing scheme divides colour image into user defined N (positive integer) number of shares with different transference where decryption is being carried out by human visual system using at least K (positive integer) number of shares out of N number of shares. In image key encryption technique the user perform user define BWM&AS operation (bit wise masking and alternate sequence) in between two constitutive bits of each pixel of original image and image key. In this combined approach we introduce two level of encryption using secret sharing scheme followed by Image key encryption technique using BWM&AS operation. Firstly, the original image is encrypted using an image key then that encrypted image is being divided into N number of shares where each of the share is again being encrypted by unique image key in encryption end. In decryption end, we retrieve original shares from the encrypted shares using appropriate image key and generate the original encrypted image by taking K number of share out of N. Lastly, we retrieve the original image by performing BWM&AS operation between the original image key and encrypted image. Thus an attempt is made to enhance the security.

References

M. AL-Laham Mohamad, “Encryption-decryption RGB color image using matrix multiplication”, International Journal of Computer Science & Information Technology (IJCSIT), Vol. 7, No 5, October 2015.

Saksham Wason, Piyush Kumar and Shubham Rathi, “Text and image encryption using color image as a key”, International Journal of Innovative Research in Technology (IJIRT), 2014.

R. Das, S. Kulia , S. Dutta , “ An Approach Of Visual Cryptography Scheme For Color Image By Cumulative Encryption Using Image Partitioning, Text Key Encryption, Image Key Encryption & Digital Enveloping”, International Journal of Engineering Research & Technology, Volume 2, Issue 5, PP-1341-1349, 2013 .

A. Bhakta , S. Maity , R. Das , S. Dutta , “An Approach of Visual Cryptography Scheme by Cumulative Image Encryption Technique Using Image-key Encryption, Bit-Sieved Operation and K-N Secret Sharing Scheme.”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), www.ijitee.org (ISSN: 2278-3075, Vol. 3 Issue 1,) ,pp 20-23 June-2013.

S. Kandar, B.C Dhara., “Random sequence based secret sharing of an encrypted color image”, RAIT, 2012, ISM Dhanbad, INDIA.

S.M.M.Karim, Md. S. Rahaman, Md. I. Hossain, “A new approach for LSB based image steganograpgy using secret key,” IEEE Xplore, DOI: 10.1109/ICCITechn.2011.6164800, Bangladesh, March, 2012. [Computer and Information Technology (ICCIT), Bangladesh, 2011].

M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology-Eurocrypt’94, PP- 1–12, 1995.

Ranjan Parekh, “Principles of Multimedia”, Tata McGraw Hill, INDIA, 2006.

J. Fridrich, “Steganography in Digital Media: Principles, Algorithms, and Applications”, Cambridge University Press, 2009.

Digiatl content for steganography, link” www. garykessler.net / library / steganography.html”.

Downloads

Published

2025-11-13
CITATION
DOI: 10.26438/ijcse/v6i5.170177
Published: 2025-11-13

How to Cite

[1]
R. Das and S. Dutta, “Cumulative Image Encryption Approach”, Int. J. Comp. Sci. Eng., vol. 6, no. 5, pp. 170–177, Nov. 2025.

Issue

Section

Research Article