Region Based Cryptography: A Study of Difference Between the .jpg Image and .png Image After Recombined RGB Images

Authors

  • Bhat IJ Dept. of Computer Application, Bhagwant Univeristy Ajmer, India
  • Mehra R Associate Professor & Dean Student Welfare Bhagwant Institute of Technology, Muzaffarnagar, India
  • Chaturvedi AK Assistant Professor MCA Departement Govt. Engineering College, Ajmer Rajasthan, India

DOI:

https://doi.org/10.26438/ijcse/v7i2.606609

Keywords:

Region Based Cryptography, .jpg image, .png image, secrets, sharing

Abstract

Today is the age of information and technology. We cannot proceed even a single step without it. We are fully dependent on information and technology. In this paper we will show that which image is best after recombined of RGB image. First we take .jpg image, differentiate it and then recombined to obtained the final image and again we take the .png image, differentiate it RGB , recombined it to get final image .At last we will compare the final image of .jpg and .png and see different.

References

[1] Blakley, G. "Safeguarding cryptographic keys". Proceedings of AFIPS 1979. 48: 313–317.

[2] Shamir, A. "How to share a secret". Communications of the ACM. 1979,22 (11): 612–613. doi:10.1145/359168.359176.

[3] Naor M, Shamir A. Visual cryptography. In: Workshop on the Theory and Application of Cryptographic Techniques;9{12 May 1994; Perugia, Italy. pp. 1-12.

[4] Sandeep Gurung, Bijoy Chhetri, Mrinal Kanti Ghose “A Novel approach for Circular Random Grid with Share Authentication”. 2015 IEEE

[5] Arash Karimi, Hadi Shahriar Shahhoseini “Cryptanalysis of a Substitution-Permutation Network Using Gene Assembly in Ciliates” Int`l J. of Communications, Network and System Sciences Vol. 5 No. 3 ,2012.

[6] B. Saha, “A Comparative Analysis of Histogram Equalization Based Image Enhancement Technique for Brightness Preservation”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 3, Issue. 3, pp. 1-5, 2015.

[7] P. Sharma1,ishra2, V.K. Sarthi3, P. Bhatpahri4, R. Shrivastava5 “ Visual Encryption Using Bit Shift Technique” International Journal of Scientific Research in Computer Science and Engineering Vol.5, Issue.3, pp.57-61, June (2017)

[8] M. Arora1*, S. Sharma2 “Synthesis of Cryptography and Security Attacks” IJSRNSC Volume-5, Issue-5, Oct 2017

[9] A. Canteaut, “Correlation attack for stream ciphers”, Encyclopedia of Cryptography and Security, pp. 261–262. Springer US, 2011.

[10] T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only. Computers”, IEEE Transactions , Vol.C-34 Issue.1pp.81–85, 1985.

[11] Fakhari P, Vahedi E, Lucas C. Protecting patient privacy from unauthorized release of medical images using a bio-inspired wavelet-based watermarking approach. Digit Signal Process 2011; 21: 433-446

[12] .Hou YC. Visual cryptography for color images. Pattern Recogn 2003; 36: 1619-1629.

[13] Hou YC, Quan ZY. Progressive visual cryptography with unexpanded shares. IEEE T Circ Syst Vid 2011; 21:1760-1764.

[14] Hou YC, Quan ZY, Tsai CF, Tseng AY. Block-based progressive visual secret sharing. Inform Sciences 2013; 233:290-304.

[15] Ito R, Kuwakado H, Tanaka H. Image size invariant visual cryptography. IEICE T Fund Electr 1999; E82-A:2172-2177.

[16] Shyu SJ. Image encryption by random grids. Pattern Recogn 2007; 40: 1014-1031.

[17] D. Boneh and M. Franklin, “Identity-based encryption from theWeil pairing, in: Advances in Cryptology – CRYPTO Lect.Notes in Comput. Sci. 2139, Springer-Verlag, pp. 213-229(2001)

Downloads

Published

2019-02-28
CITATION
DOI: 10.26438/ijcse/v7i2.606609
Published: 2019-02-28

How to Cite

[1]
I. J. Bhat, R. Mehra, and A. K. Chaturvedi, “Region Based Cryptography: A Study of Difference Between the .jpg Image and .png Image After Recombined RGB Images”, Int. J. Comp. Sci. Eng., vol. 7, no. 2, pp. 606–609, Feb. 2019.