Professional Documents
Culture Documents
Sreejit Roy Chowdhury et al, American Journal of Advanced Computing, Vol. 1(1), 1-4
Abstract—Data encryption is to conceal the information of networks and the number of users, as well as the
content of secret data. It is different from data hiding where the convergence of information and communications
objective is to conceal the existence of secret data. A reversible technologies, while enhancing the utility of these systems, also
data encryption technique can extract intended information increase system vulnerability. Security of information and
content from the encrypted data without any loss of information. communications systems involves the protection of the
The decryption process should be done at legitimate or authentic availability, confidentiality and integrity of those systems and
receiver end. The encrypted data can be directly transmitted via the data that is transmitted and stored on them.
communication channels because it completely lost its
resemblance with the original information. Although it is Data hiding conceals the existence of secret messages
theoretically possible to break such security, but it is not feasible while cryptography protects the content of messages for
by any known practical means and appear as a random-noise to secure communication in the presence of third parties (called
non-intended recipients or adversaries. To incorporate second adversaries). The word steganography is derived from Greek
fold of security, a suitable data hiding method can be used to and it literally means “covered writing”; the art of hiding
embed the encrypted data. This paper proposes a new visual data information in ways that prevent detection. It includes a
encryption method by shuffling pixel information randomly variety of secret communication methods that can conceal the
within the image. The reformation of image using proposed existence of messages [1–3]. Information can be hidden in
scheme completely looses the original characteristics. Our many different ways. In order to hide information, a straight
experimental results show the proposed method can achieve the
message insertion may encode every bit of information in the
claim.
cover data or it may selectively embed messages in noisy
Keywords—pseudo random permutation; encryption; lossless; areas that generally draw less attention. Messages may also be
cryptography; diagonal scanning; zigzag scanning; spiral scattered randomly throughout the cover data. Least
scanning. significant bit (LSB) insertion is one of the common methods
of data hiding [4-6].
A A A A A A A A A A
11 21 12 31 22 13 41 32 23 14
IV. results
We observe that the encrypted image has no resemblance with
the original image. The images are shown in figure 1 to 4. The
decrypted image retrieves the original image information and
visually same as figure 1. The PSNR value is shown in table 4
PSNR:
It measures the quality of the decrypted image. It is basically a
performance metric and is used to determine perceptual
transparency of encrypted image with original image and
Figure 1: Original image decrypted image with original image.
References