An Enhanced Text to Image Encryption Technique using RGB Substitution and AES

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-5                      
Year of Publication : 2013
Authors : Sourabh Singh , Anurag Jain

Citation 

Sourabh Singh , Anurag Jain. "An Enhanced Text to Image Encryption Technique using RGB Substitution and AES". International Journal of Engineering Trends and Technology (IJETT). V4(5):2108-2112 May 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

In network security applications, before transmitting data to a remote machine it is encrypted at the sender side using any standard encryption algorithm. Most of the encryption algorithms make use of secret key without which it becomes very difficult to retrieve the actual data In this paper we propose a method which at first transforms the text into an image using an RGB substitution, and then encrypts the resulting image using AES Algorithm, under this approach, the secret key is smartly sent along with the cipher text in a single transmission, thus it also solves th e key exchange problem that generally arises in most of the encryption models. The encryption and decryption process make the use of a combination database for text to image transformation. This paper is divided into following four sections; in section - I, we presented basic introduction of Network Security, in section - II, a survey on related algorithms has been presented, section - III discusses the proposed model and section IV concludes the paper.

References

[1] Ahmad Abusukhon Mohammad Talib “ A Novel Netwo rk Security Algorithm Based on Private Key Encryption ” IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 .
[2] Kiran Kum ar, M., Mukthyar Azam, S., and Rasool, S. (2010) “ Efficient digital encryption algorithm based on matrix scrambling technique ” . International Journal of Network Security and its Applications (IJNSA), 2(4).
[3] Komal D Patel, Sonal Belani “Image Encryptio n using different Techniques” International Journal of Emerging Technology and Advanced Engineering Volume 1, Issue 1, November 2011 .
[4] P.Karthigaikumar Soumiya Rasheed “ Simulation of Image Encryption using AES Algorithm” IJCA Special Issue on Computati onal Science - New Dimensions & Perspectives” NCCSE, 2011 .
[5] Manoj.B, Manula N Harihar “Image Encryption and Decryption using AES” International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume - 1, Issue - 5, June 2012 .
[6] Jawad Ahmad and Fawad Ahmed “Efficiency Analysis and Security Evaluation of Image Encryption Schemes” International Journal of Video & Image Processing and Network Security IJVIPNS - IJENS Vol:12 No:04 .
[7] P. Radhadevi, P. Kalpana “Secure Image Encryptio n Using AES” International Journal of Research in Engineering and Technology Volume: 1 Issue: 2 .
[8] Ahmed Bashir Abugharsa, Abd Samad Bin Hasan Basari and Hamida Almangush “A Novel Image Encryption using an Integration Technique of Blocks Rotation based on the Magic cube and the AES Algorithm” International Journal of Computer Science Issues (IJCSI); Vol. 9 Issue 4, p41 Jul2012

Keywords
Symmetric key, Asymmetric key, Encryption, Dec ryption, AES.