Abstract
In the current covid pandemic situation, secure online transmission of data has the highest precedence over other activities. For providing computational hardness that is for making tough to break the key for finding the unique message, there are various algorithms are present. For secure data transmission, many researchers have applied different cryptography algorithms and in order to improve the level of information security, different hybrid cryptography algorithms have been proposed. In cryptography algorithm implementation, key management plays a major role. For this reason, we have applied an image encryption technique in which a random image is considered as the key. Using the random image as a key, we have encrypted another image as information using the RSA algorithm. The comparison of the proposed method is done with the traditional approach and concluded that the cryptography algorithm implemented using an image as key provides more security in terms of encryption and decryption time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Forouzan BA. Cryptography & network security, 1st edn. TMH
Kahate A. Cryptography and network security, 2nd edn. TMH
Al Sabti KDM, Hashim HR (2016) A new approach for image encryption in the modified RSA cryptosystem using MATLAB. Glob J Pure Appl Math 12(4). ISSN 0973-1768
Sethi PC, Behera PK (2015) Methods of network security and improving the quality of service—a survey. Int J Adv Res Comput Sci Softw Eng 5(7):1098–1106
Sethi PC, Behera PK (2016) RSA cryptography algorithm using linear congruence class. Int J Adv Res 4(5):1335–1347
Sheu T-F, Huang N-F, Lee H-P (2010) In-depth packet inspection using a hierarchical pattern matching algorithm. IEEE Trans Dependable Secure Comput 7(2)
Durairaj M, Muthuramalingam K (2018) A new authentication scheme with elliptical curve cryptography for internet of things (IoT) environments. Int J Eng Technol 7(2.26):119–124. https://doi.org/10.14419/ijet.v7i2.26.14364
Sethi PC, Behera PK (2017) Network traffic management using dynamic bandwidth on demand. Int J Comp Sci Inf Secur (IJCSIS) 15(6):369–375
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sahoo, A., Mohanty, P., Sethi, P.C. (2022). Image Encryption Using RSA Algorithm. In: Udgata, S.K., Sethi, S., Gao, XZ. (eds) Intelligent Systems. Lecture Notes in Networks and Systems, vol 431. Springer, Singapore. https://doi.org/10.1007/978-981-19-0901-6_56
Download citation
DOI: https://doi.org/10.1007/978-981-19-0901-6_56
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0900-9
Online ISBN: 978-981-19-0901-6
eBook Packages: EngineeringEngineering (R0)