z-logo
open-access-imgOpen Access
An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy
Author(s) -
Apoorva Shrivastava,
Lokesh Singh
Publication year - 2016
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2016909098
Subject(s) - encryption , computer science , key (lock) , cryptography , computer security , entropy (arrow of time) , key size , symmetric key algorithm , theoretical computer science , public key cryptography , physics , quantum mechanics
in data communication is a very important concern today. It is used in almost every region like e-commerce, education, and industry and data warehouse. Securely sending and receiving data in the above area is an important as the data is crucial. Image security plays an important role in this age. As the demand of image based message sending is improving day by day. In this paper, we have proposed an efficient image cryptography system based on RC6. The key size and number of variable rounds makes RC6 more secure. The key size is variable up to 2040 bits. The results are achieved in terms of entropy and correlation coefficients. The less variation in entropy is achieved from our approach. KeywordsChaos, Steganography, Security Measures. So in the ensuing segment we talk about data encryption method for picture encryption. We additionally talk about the pivotal angles which are utilized as a part of picture encryption with their points of interest and drawbacks. At long last taking into account the discourses we additionally recommend some future comment which may be productive in this bearing. There are niacumerous essential techniques which are second- hand pervasive cryptography, for example, private or mystery key cryptography, open fundamental or kilter, computerized mark, and hash capacities (15). In private key cryptography, a solitary key is leftover for both encryption and decoding. This obliges meander if all else fails part convey offering an impersonation of the key and the key be struck by be passed swear off a safe channel to the next individual (13-22). Private-key calculations are level indestructible and effectively actualized in equipment. Along these lines they are over and again second-hand for mass measurements encryption. The vast please of the all-around adjusted encryption rely on upon plaintext, encryption calculation, key and unscrambling calculation. The plaintext is the size ahead requiring the encryption calculation. It is joining of the inputs to the encryption calculation. The encryption calculation is the calculation used to continue on b deal with the information stranger plaintext to figure relieve. The mystery key is a comparable to repel of the encryption calculation and of the plaintext and it is associate of the encryption's inputs calculation (23)(24). The figure content is the defiant content discover as yield (14)(15). The steganography technique with cryptography will enhance the security as the cryptic content and the randomization quality can be improved.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom