Advertisement

A Novel Image Encryption Technique Using Arnold Transform and Asymmetric RSA Algorithm

  • Gaurav Kumar Soni
  • Himanshu AroraEmail author
  • Bhavesh Jain
Conference paper
  • 35 Downloads
Part of the Algorithms for Intelligent Systems book series (AIS)

Abstract

Today, people all over the world want to exchange information, but they are concerned about security aspects while sharing information. The encryption and decryption are the one of the best methods to transfer the information securely. In this process, two types of algorithms are used symmetric and asymmetric algorithm. In the symmetric algorithm, we used the same key to encrypt and decrypt the information and in asymmetric algorithm used the pair of key to encrypt and decrypt the information, one is used for encryption, and another is used for decryption. Hence, asymmetric algorithms are more secured. In the asymmetric algorithm, the RSA is the one of the most popular algorithms. In this paper, present a hybrid technique of image encryption using the Arnold’s transformation and RSA algorithm. In this proposed methodology, first scrambles the digital image using Arnold’s transformation after that encrypts that digital image using an asymmetric RSA algorithm. The proposed method is safer, and the result of the resulting encrypted image is improved and safer as shown in this paper.

Keywords

Cryptography Decryption Encryption Image encryption RSA Arnold’s transformation 

References

  1. 1.
    Madhu B, Holi G, Srikanta Murthy K (2016) An overview of image security techiques. Int J Comput Appl 154(6):37–46Google Scholar
  2. 2.
    Mathur S, Gupta D, Goar V, Kuri M (2017) Analysis and design of enhanced RSA algorithm to improve the security. In: 3rd IEEE international conference on computational intelligence and communication technology (IEEE-CICT 2017), pp 1–5Google Scholar
  3. 3.
    Panda PK, Chattopadhyay S (2017) A hybrid security algorithm for RSA cryptosystem. In: IEEE international conference on advanced computing and communication systems (ICACCS-2017), pp 1–6Google Scholar
  4. 4.
    Roshni Raj VK, Santhosh Kumar BJ, Nair A (2017) Comparative study on AES and RSA algorithm for medical images. In: IEEE international conference on communication and signal processing, pp 501–504Google Scholar
  5. 5.
    Guan P, Xue Y, Qiu Y, Sun Q (2012) A novel digital image encryption method based on one-dimensional random scrambling. In: IEEE 9th international conference on fuzzy systems and knowledge discovery, pp 1669–1672Google Scholar
  6. 6.
    Shiva Shankar S, Rengarajan A (2016) Data hiding in encrypted images using Arnold transform. ICTACT J Image Video Process 07(01):1339–1344 (2016)CrossRefGoogle Scholar
  7. 7.
    Yen JC, Guo JI (2000) An efficient hierarchical chaotic image encryption algorithm and its VLSI realization. In: IEEE proceedings-vision, image and signal processing, pp 167–175Google Scholar
  8. 8.
    Cheng H, Li XB (2000) Partial encryption of compressed image and videos. IEEE Trans Signal Process, 2439–2451CrossRefGoogle Scholar
  9. 9.
    Minni R, Sultania K, Mishra S, Vincent DR (2013) An algorithm to enhance security in RSA. In: IEEE 4th ICCCNT 2013, pp 1–4Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Gaurav Kumar Soni
    • 1
  • Himanshu Arora
    • 2
    Email author
  • Bhavesh Jain
    • 2
  1. 1.Department of ECEArya College of Engineering and Research CentreJaipurIndia
  2. 2.Department of CSEArya College of Engineering and Research CentreJaipurIndia

Personalised recommendations