Compact optical asymmetric cryptosystem based on unequal modulus decomposition of multiple color images

2020 ◽  
Vol 129 ◽  
pp. 106063 ◽  
Author(s):  
Mohamed Abdelfattah ◽  
Salem F. Hegazy ◽  
Nihal F.F. Areed ◽  
Salah S.A. Obayya
Fractals ◽  
2014 ◽  
Vol 22 (04) ◽  
pp. 1450011 ◽  
Author(s):  
D. C. MISHRA ◽  
R. K. SHARMA ◽  
MANISH KUMAR ◽  
KULDEEP KUMAR

In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.


Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


2012 ◽  
Vol 7 (2) ◽  
pp. 34-43
Author(s):  
sakshi shrivastava ◽  
◽  
Siddhartha Choubey ◽  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document