International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 04 | Apr -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3186
An Efficient Technique for Image Encryption and Decryption for
Secured Multimedia Application
Ashish S. Dongare
1
, Dr. A. S. Alvi
2
, Prof. N. M. Tarbani
3
1
Dept. of Computer Science and Engineering,
Prof Ram Meghe institute of Technology and Research, Maharashtra, India.
23
Professor, Dept. of Computer Science and Engineering,
Prof Ram Meghe institute of Technology and Research, Maharashtra, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In the recent years, Internet multimedia
applications have become very popular. The rapid growth in
the use of multimedia information has made the security of
data storage and transmission important in avoiding
unlawful, unofficial, unauthorized and illegal use. Encryption
is an efficient operation to protect multimedia data secret.
There are various techniques which are discovered from time
to time to encrypt the images to make images more secure.
Moreover, there are many image encryption schemes have
been proposed, each one of them has its own strength and
weakness. Innovative encryption techniques need to be
developed for effective data encryption for financial
institutions, e-commerce, and multimedia applications. For
future internet applications on wireless networks,
cryptographic coding techniques for multimedia applications
need to be studied and developed. In this paper, we focus on
the efficient encryption techniques for an image in multimedia
applications.
Key Words: Image Encryption, key Generation, Input
Image, LSB.
1.INTRODUCTION
There has been an explosive growth of using computers,
networks, communications and multimedia applications.
Multimedia data security is very important for multimedia
commerce on the Internet such as video on-demand and
real-time video multicast. The image encryption is widely
used to secure transmission of data in an open internet
works. Every data has its own unique features; therefore
different data requires different type of encryption
algorithm. Many of the available algorithms are suitable for
textual data but they are not suitable for multi-media data
such as images, videos. Moreover, traditional cryptographic
algorithms which are available for data security are often not
fast enough to process the large amount of data generated by
different multimedia applications to meet the real-time
needs. Because of the increasing demand for information
security, image encryption decryption has become an
important research area and it has broad application
prospects. Image security is of utmost concern as web
attacks have become more and more serious. Image
encryption decryption has applications in internet
communication, multimedia systems, medical imaging,
telemedicine, military communication. Since, these images
may carry highly confidential information, so these images
entail extreme protection when users amass somewhere
over an unreliable repository. Furthermore, when people
wish to transfer images over an insecure network, then it
becomes crucial to provide an absolute protection. In brief,
an image requires protection against various security
attacks. To make the data secure from various attacks and
for the integrity of data we must encrypt the data before it is
transmitted or stored. Government, military, financial
institution, hospitals and private business deals with
confidential images about their patient (in Hospitals),
geographical areas (in research ), enemy positions (in
defense), product, financial status. Most of this information is
now collected and stored on electronic computers and
transmitted across network to other computer.
The primary intention of keeping images protected is to
maintain confidentiality, integrity and authenticity. Different
techniques are available for making images secure and one
technique is encryption. Adopting and applying various
encryption algorithms can ensure security of data from
spoofing and eavesdropping from the unauthorized attacks
and crypto-analyst. However, the current forms of
broadcasting and delivery of multimedia data through
wireless channels, are highly insecure and vulnerable due to
the inherent nature open access from massive users and
receivers, if not properly encrypted. Generally, Encryption is
a procedure that transforms an image into a cryptic image by
using a key. Furthermore, a user can retrieve the initial
image by applying a decryption method on the cipher image
which is usually a reverse execution of the encryption
process. The diverse algorithms are accessible to encrypt
information, specifically; RSA, DES, AES, etc.
Cryptography is the study of transmitting secret messages
securely from one party to another. It plays an important
role to secure confidentiality of data while transferring data
particularly via Internet. Within the context of any
application-to-application communication, there are some
specific security requirements Confidentiality,
Authentication, Integrity and Non-repudiation. Cryptography
is a method for protecting image-based secrets that has a
computation-free decoding process. Now days, the security
of digital images has become immensely important in many