Skip to main content

A Multi-level Secured Approach Using LBP and Spiral Scan Path

  • Conference paper
  • First Online:

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 77))

Abstract

The world is becoming more interconnected with the advent of Internet and new networking technologies. Security is becoming an important factor and a vital component while transmitting data in the communication channel. As the data is highly confidential, the most popular approach is cryptography which deals with the techniques of secret writing. The goal is to allow the intended recipients of a message to receive the message securely while preventing eavesdroppers from understanding the message. The techniques of cryptography and network security are fully growing, and these lead to the process of development of practical and readily available robust and dynamic techniques. The proposed method encrypts the data in three levels—using dynamically generated key, local binary pattern, gray code, and spiral scan path. Local binary pattern is a nonparametric descriptor which efficiently summarizes the local bits of data. Gray code along with spiral scan path provides high security.

This is a preview of subscription content, log in via an institution.

References

  1. Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn, pp. 30–39. Prentice Hall, Upper Saddle River (2006)

    Google Scholar 

  2. Mohammed, B.B.: Automatic key generation of Caesar Cipher. Int. J. Eng. Trends Technol. 6(6), 2231–5381 (2013)

    Google Scholar 

  3. Huang, D., Shan, C., Ardabilian, M.: Local binary patterns and its application to facial image analysis: a survey. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 41(6), 765–781 (2011)

    Article  Google Scholar 

  4. Pradeep Kumar Reddy, R., Nagaraju, C.: Text encryption through level based privacy using DNA steganography. Int. J. Eng. Trends Technol. Comput. Sci. 3(3), 2278–6856 (2014)

    Google Scholar 

  5. Wakerly, J.F.: Digital Design: Principles and Practices, 4th edn, pp. 48–50. Pearson Education India, New Delhi (2009)

    Google Scholar 

  6. Singh, A., Goswami, L., Ur Rahman Khan, A.: A novel image encryption algorithm for enhanced security. Int. J. Eng. Res. Technol. (IJERT) 2(9)‚ 2942–2949 (2013)

    Google Scholar 

  7. Paul, M., Kumar Mandal, J.: A novel symmetric key cryptographic technique at bit level based on spiral matrix concept. In: International Conference on Information Technology, Electronics and Communications (ICITEC—2013), Bangalore, India, 30–31 March 2013, pp. 6–11 (2013)

    Google Scholar 

  8. Ramanujam, S., Karuppiah, M.: Designing an algorithm with high avalanche effect. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 11(1), 106–111 (2011)

    Google Scholar 

  9. Singh, S., Maakar, S.K., Kumar, S.: Performance analysis of DES and RSA cryptography. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 2(3), 418–422 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Subramanyan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Subramanyan, N., Kiran, S., Pradeep Kumar Reddy, R., Manju Yadav, P. (2018). A Multi-level Secured Approach Using LBP and Spiral Scan Path. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Computing and Informatics . Smart Innovation, Systems and Technologies, vol 77. Springer, Singapore. https://doi.org/10.1007/978-981-10-5544-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5544-7_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5543-0

  • Online ISBN: 978-981-10-5544-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics