Encryption and Decryption of an Image Data – a Parallel Approach

  • Authors

    • Raghu M E
    • K C Ravishankar
    2018-09-01
    https://doi.org/10.14419/ijet.v7i3.34.19414
  • Cryptography, Encryption, Decryption, Parallel, Threads
  • Multimedia data has been essential part of our lives, from instant messaging application to social media. Instant messaging applications like WhatsApp uses AES 256 bit key for security purpose. The security measures are taken so as to protect the data from unauthorized access and to ensure privacy. This paper mainly considers image data as source for encryption and decryption. Along with text, AES algorithm is used for image cryptography, in its suitable way. The AES algorithm is chosen because of its highly secured way of encryption and decryption. Time required for the procedure of encryption and decryption is also measured. Present use of Internet, mobile and socialmedia made images considerable value in our daily life.  Securing multimedia data is becoming an important issue in communication and storage. Secured communication of digital images is needed in many areas, such as electronic commerce,medical imaging systems, mobile check deposit, online photograph album, military image communication, etc.., There is a need of developing fast encryption methodologies for such communication 
  • References

    1. [1] J. Ahmad, S. Oun Hwang and A. Ali (2015),“An Experimental Comparison of Chaotic and NonchaoticImage Encryption Schemes", Wireless personal communication, Volume 84, Issue 2, pp 901–918

      [2] R. Yadavi, M. Beg2 & M. Tripathi (2013), "Image Encryption Techniques: A Critical Comparison",International Journal of Computer Science Engineering and Information Technology Research(IJCSEITR) ISSN 2249-6831 Vol. 3, Issue 1.

      [3] R. Pakshwar, V. Kumar Trivedi and V. Richhariya (2013), "A Survey on Different ImageEncryption and DecryptionTechniques, IJCSIT, Vol. 4 (1), 2013, 113 –116.

      [4] J. Shah and V. Saxena (2011), "Performance Study on Image Encryption Schemes", IJCSIInternational Journal of Computer Science Issues, Vol. 8, Issue 4, No 1.

      [5] Sivaguru J, ManikandanG,Sharman,Karthikeyan .S, “A Parallel Approach for Improving Data Security,†Journal ofTPIT, Vol. 39 No.2, 15 May 2012, PP. no 119-125.

      [6] Osama Khalifa, “The performance of cryptographic algorithms in the age of Parallel computing,â€, August-2011, Heriot Watt University School Of Mathematical and Computer Science.

      [7] Salem Sherif Elfard. “University Bulletin – ISSUE,†No. - 15 – Vol. 2- 2013

      [8] RavishankarK C and VenkateshmurthyM G, “Pixel Compaction and Encryption for Secure Image Transmission,â€NCIDAPD-2007, BIT Sathyamangalam, March 15-16, 2007

  • Downloads

  • How to Cite

    M E, R., & C Ravishankar, K. (2018). Encryption and Decryption of an Image Data – a Parallel Approach. International Journal of Engineering & Technology, 7(3.34), 674-677. https://doi.org/10.14419/ijet.v7i3.34.19414