Data Encoding and Decoding by Using Image Database

Authors

  • Prachi Singh, Parikshit Tiwari

Keywords:

Cryptography, Data Encoding, Image Database, RSA

Abstract

During the last decades, information security has become a major issue. Encrypting and decrypting data have recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very hard to crack. Cryptography plays major roles to fulfillment these demands. Nowadays, many of researchers have proposed many of encryption and decryption algorithms such as AES, DES, RSA, and others. But most of the proposed algorithms encountered some problems such as lack of robustness and significant amount of time added to packet delay to maintain the security on the communication channel between the terminals. In this paper, the security goals were enhanced via "A New Approach for this work RSA keys are sharing using image pixel color values.

References

. Amare Anagaw Ayele, Dr. Vuda Sreenivasarao, June 2013, “A Modified RSA Encryption Technique Based on Multiple public keys”, International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 4.

. Liang Wang, Yonggui Zhang, 2011, “A New Personal Information Protection Approach Based on RSA Cryptography”, IEEE.

. Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah, 2013, “Quantum Key Distribution by Using Public Key Algorithm(RSA)”, IEEE.

. Norhidayah Muhammad, Jasni Mohamad Zaini, Md Yazid Mohd Saman, “Loop-based RSA Key Generation Algorithm using String Identity”, 13th International Conference on Control, Automation and Systems (ICCAS 2013).

. Ms. Ritu Patidar, Mrs. Rupali Bhartiya, 2013, “Modified RSA Cryptosystem Based on Offline Storage and Prime Number”, IEEE.

. Malek Jakob Kakish, “Enhancing The Security Of The Rsa Cryptosystem”, Ijrras August 2011.

. M. Jason Hinek, Another Look at Small RSA Exponents, 2006.

. B. A. Forouzan, D. Mukhopadhyay, Cryptography and Network Security, Tata McGraw-Hill, 2012.

. Abdullah Darwish Imad Khaled Salah and Saleh Oqeili, Mathematical Attacks on RSA Cryptosystem, Journal of Computer Science (2006).

. J. M. Pollard, A Monte Carlo Method for Factorization, BIT Numerical Mathematics (1975).

. H. Riesel, Prime Numbers and Computer Methods for Factorization, Birkhauser, 1994.

. William Stein, Elementary number theory. Primes, congruences, and secrets. A computational approach., New York, NY: Springer, 2009 (English).

Downloads

How to Cite

Prachi Singh, Parikshit Tiwari. (2017). Data Encoding and Decoding by Using Image Database. International Journal of Research & Technology, 5(2), 63–67. Retrieved from https://ijrt.org/j/article/view/372

Issue

Section

Original Research Articles

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.