Abstract
The world is becoming more interconnected with the advent of Internet and new networking technologies. Security is becoming an important factor and a vital component while transmitting data in the communication channel. As the data is highly confidential, the most popular approach is cryptography which deals with the techniques of secret writing. The goal is to allow the intended recipients of a message to receive the message securely while preventing eavesdroppers from understanding the message. The techniques of cryptography and network security are fully growing, and these lead to the process of development of practical and readily available robust and dynamic techniques. The proposed method encrypts the data in three levels—using dynamically generated key, local binary pattern, gray code, and spiral scan path. Local binary pattern is a nonparametric descriptor which efficiently summarizes the local bits of data. Gray code along with spiral scan path provides high security.
This is a preview of subscription content, log in via an institution.
References
Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn, pp. 30–39. Prentice Hall, Upper Saddle River (2006)
Mohammed, B.B.: Automatic key generation of Caesar Cipher. Int. J. Eng. Trends Technol. 6(6), 2231–5381 (2013)
Huang, D., Shan, C., Ardabilian, M.: Local binary patterns and its application to facial image analysis: a survey. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 41(6), 765–781 (2011)
Pradeep Kumar Reddy, R., Nagaraju, C.: Text encryption through level based privacy using DNA steganography. Int. J. Eng. Trends Technol. Comput. Sci. 3(3), 2278–6856 (2014)
Wakerly, J.F.: Digital Design: Principles and Practices, 4th edn, pp. 48–50. Pearson Education India, New Delhi (2009)
Singh, A., Goswami, L., Ur Rahman Khan, A.: A novel image encryption algorithm for enhanced security. Int. J. Eng. Res. Technol. (IJERT) 2(9)‚ 2942–2949 (2013)
Paul, M., Kumar Mandal, J.: A novel symmetric key cryptographic technique at bit level based on spiral matrix concept. In: International Conference on Information Technology, Electronics and Communications (ICITEC—2013), Bangalore, India, 30–31 March 2013, pp. 6–11 (2013)
Ramanujam, S., Karuppiah, M.: Designing an algorithm with high avalanche effect. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 11(1), 106–111 (2011)
Singh, S., Maakar, S.K., Kumar, S.: Performance analysis of DES and RSA cryptography. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 2(3), 418–422 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Subramanyan, N., Kiran, S., Pradeep Kumar Reddy, R., Manju Yadav, P. (2018). A Multi-level Secured Approach Using LBP and Spiral Scan Path. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Computing and Informatics . Smart Innovation, Systems and Technologies, vol 77. Springer, Singapore. https://doi.org/10.1007/978-981-10-5544-7_8
Download citation
DOI: https://doi.org/10.1007/978-981-10-5544-7_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5543-0
Online ISBN: 978-981-10-5544-7
eBook Packages: EngineeringEngineering (R0)