Image Encryption for Secure Internet Tra
Image Encryption for Secure Internet Tra
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 22, Issue 2, Ser. I (Mar - Apr 2020), PP 29-34
www.iosrjournals.org
Abstract: Encryption is a technique widely used in cryptography for the conversion of any readable
information or message into a non-readable form, also known as encrypted form in order to protect our data
from unauthorized entities. This increases the security of both, our system as well as the data. This mechanism
is done via a finite set of instructions, known as algorithms and, set of characters for encryption know askeys.
This project uses the combination of AES and RSA algorithms that are implemented on the system to make the
process of hacking tougher. The ultimate objective is to maintain the confidentiality, integrity and privacy of the
data that is being transferred over the channel, from the side of the sender to the side of the receiver. A
technique of encrypting a colored image using random matrix key encoding is proposed to ensure the high
security while transfer of data.
Keywords: encryption, AES, RSA, decryption, security, keys, random matrix
----------------------------------------------------------------------------------------------------------------------------- ----------
Date of Submission: 18-03-2020 Date of Acceptance: 03-04-2020
------------------------------------------------------------------------------------------------------------------------ ---------------
I. Introduction
In an organization, system security protocols are needed to ensure the protection of data and
information in its networks and resources. Thus, data security is important for safeguarding the corporate asset.
If the organizations fail to achieve the same, it could lead to major loss of information such as dipping of sales,
discrepancy in the expected results, lack of monitory judgementsetc.
Security of data and information is very important especially when the data is required to be shared
with other users. High level of integrity and confidentiality of data is supposed to be maintained when the
sharing of data is done. The process of keeping our data safe and secured from other users is known as data
security. Data security is implemented to protect our data from being accessed by unauthorized entities like
hackers. A very common technique that is used to achieve the same is encryption. Encryption technique is used
to convert the readable form of data into unreadable form by using the right set of encryption keys and
algorithms. The key is used for encoding and decoding the data. The access to this key is only with the
authorized users resulting in high security of data. Encrypting the data in form of text is comparatively easier
than encrypting the images and videos. Encryption of images and videos require certain characteristics like mass
data capacity and high dataredundancy.
The process of image encryption includes conversion of an image into another difficult image that is
not easy to be recognized in order to maintain its confidentiality. In order to view the actual image, decryption of
the image needs to be done using a decryption key. There are various methods that can be used for the purpose
of conversion of the images however a continuous development of more techniques is done so as to achieve the
best method of encryption. Thus, for the implementation of this technique we tend to use a set of important
algorithms that effectively help in achieving a secure and desired output. RSA and AES are the two algorithms
used in thisproject.
Data encryption methods can be distinguished under two categories i.e. substitution and transposition,
based on their cryptographic algorithms. In substitution method, the data is replaced by some other symbol
according to the algorithm and in transposition method the position of the data is interchanged or jumbled,
following a specific algorithm.
Earlier, a new algorithm was introduced. According to that algorithm, the image was divided into small
blocks, approximately of size 8x8. After that the blocks were shuffled and processed resulting in the generation
of a random 2D image map. This algorithm makes the decryption more complicated and secure so that the
unauthorized users cannot crack the algorithm easily and the confidentiality remains intact. In progress to this
algorithm, another algorithm was proposed recently in which shuffling of the image pixels was carried out. This
was done to generate a cipher image from a plain image which results into higher security and greater resistance
to the attacks.
A lot of researches are carried out to achieve the maximum amount of security when it comes to the transfer of
images in order to avoid the access of unauthorized users and increase thesecurity.
III. Methodology
In this project, we are using Python for the basic encryption and decryption process of the image that has to be
sent over a secure internetchannel.
Firstly, the user uploads the image which can be done either by desired path defined by used by the user or by
capturing the image using awebcam.
Once the image is uploaded and the matrix of the image is generated. Then the user goes through the encryption
process of the desired image. This step is used to convert the actual
Now, on selecting the desired option amongst the two mentioned above, the actual image is converted
into an encrypted byte code format instantly via the AES algorithm. Which means that the image does not
appear the same due to the application of the encryption algorithms.
The generated encrypted byte-code image is taken as the input for the image that needs to be decrypted by the
RSA algorithm.
This encrypted byte-code is then converted into an encrypted image via the RSA algorithm.
It is now safe to be sent over the transfer channel from sender‟s end to the receiver‟s end.
This can be done via several techniques such as Email, Whatsapp, Message etc.
The user is asked to provide the Recipient‟s Email address over which the sender is required to send the
Decrypted image securely.
The recipient receives the Decrypted image eventually through this secure Internet transfer technology.
In order to achieve image encryption, a method was suggested according to which the image color should be
converted to grey before encryption to achieve greater confidentiality. However, this method had some
disadvantages as well. The disadvantages are asfollowed:
1. The components in this process requires greater memoryspace.
2. The components in this process also require extra time for the transmission ondata.
3. The red and greens components in this process are usually not secure.
V. Technique implementation
For illustrating the concept let‟s take a look at the following steps:
Upload the image that has to be encrypted before itstransmission.
Generate the matrix corresponding to the uploadedimage.
VIII. Conclusion
The security of digital images has become an important part of cyber security since a lot of transfer
occurs over the internet in the form of images very frequently. This new technique of image encryption and
decryption uses combination of two encryption algorithms namely AES and RSA. According to our experiments
the image transmission has rapidly been increased and has become much more secure. The user sends the
decrypted image to the receiver and dynamically takes the input of the receiver‟s email id so that the image is
always sent to the desired person enhancing the security during transmission. Usually, the process of decryption
of the image produces a black and white image but, in our project, we have ensured that the decrypted image is a
colouredimage.
References
[1]. Prof ZiadAlQadi,(2020),‟A Highly Secure And Accurate Method for RGB ImageEncryption‟.
[2]. AshutoshShukla,JayShah,NikhilPrabhu(2013),‟Image Encryption Using Elliptical CurveCryptography‟
[3]. Mohamad M Al-Laham,(2015),‟Encryption-Decryption RGB Color Image Using MatrixMultiplication‟
[4]. PriyaDeshmukh,(2016),‟An Image Encryption and Decryption method using AESAlgorithm‟.
[5]. G A.Sathishkumar, K. Bhoopathybagan and N. Sriraam, (2011) “Image encryption based on diffusion and multiple chaotic maps”,
International Journal of Network Security & its Applications, Vol. 3, No. 2, pp181-194.
[6]. Jamil Al Azzeh, Hussein Alhatamleh, ZiadA. Alqadi, Mohammad Khalil Abuzalata : Creating a Color Map to be used to Convert a
Gray Image to Color Image; International Journal of Computer Applications (0975 – 8887).Volume 153 – No2, November2016.
[7]. Ziadalqadi, Analysis of stream cipher security algorithm, Journal of Information and Computing Science, v. 2, issue 4, pp. 288-
298,2007.
[8]. Mohammed Abuzalata Jamil Al-Azzeh, ZiadAlqadi; Performance Analysis of Artificial Neural Networks used for Color Image
Recognition and Retrieving: International Journal of Computer Science and Mobile Computing, Vol.8 Issue.2, February-2019.
[9]. ] Jamil Al Azzeh, ZiadAlqadiQazem, M. Jabber: Statistical Analysis of Methods Used to enhanced Color Image Histogram; XX
International Scientific and Technical Conference; Russia May 24- 26,2017.
[10]. Bilal Zahran, Jamil Al-Azzeh, ZiadAlqadi, and Mohd- Ashraf Al Zoghoul: A Modified Lbp Method To Extract Features From
Color Images: Journal of Theoretical and Applied Information Technology May2018.
[11]. J Al-Azzeh M Abuzalata, ZiadAlqadi, Modified Inverse LSB Method for Highly Secure Message Hiding, International Journal of
Computer Science and Mobile Computing, v, 8, issue 2, pp. 93-103,2019..
[12]. KundankumarRameshwarSaraf, Vishal Prakash Jagtap, Amit Kumar Mishra, (2014, May-June).”Text and Image Encryption
Decryption Using Advance Encryption Standard”, International Journal of Emerging Trends and Technology in computer
science(IJETTCS) volume-3, issue-3,pp.118-126.
Ashish Chauhan,etal. "Image Encryption for Secure Internet Transfer." IOSR Journal of
Computer Engineering (IOSR-JCE), 22.2 (2020), pp. 29-34.