Securing Media Information Using
Hybrid Transposition Using Fisher Yates
Algorithm and RSA Public Key
Algorithm Using Pell’s Cubic Equation
K. R. Raghunandan, Shirin Nivas Nireshwalya, Sharan Sudhir,
M. Shreyank Bhat, and H. M. Tanvi
Abstract Information is the source of investment as well as income. Protecting
information has become one of the primary objectives of security algorithms. In the
field of multimedia, there is scope for extracting sensitive data without any loss of
information which implies that there is no trace of an intrusion. Multimedia data
must be confidential, and its integrity and identity must be preserved as it encounters
authentication, data encryption, data decryption, digital watermarking and other sim-
ilar activities. Providing multimedia security ensures content-based security. This
paper introduces an enhanced algorithm for the transmission of images between
the sender and recipient by addressing the most relevant security aspects of image
transformation as well as transmission.
Keywords Multimedia security · Image transformation · Public key
cryptography · Encryption · Decryption
1 Introduction
Multimedia technology has a significant impact on privacy, making data protection
important, now more than ever. In this domain, the cryptographic technique has a
K. R. Raghunandan (B ) · S. N. Nireshwalya · S. Sudhir · M. S. Bhat · H. M. Tanvi
Department of Computer Science and Engineering, N. M. A. M. Institute of Technology,
Affiliated to Visvesvaraya Technological University, Nitte, India
e-mail: raghunandan@nitte.edu.in
S. N. Nireshwalya
e-mail: shirinnivas@hotmail.com
S. Sudhir
e-mail: sharan.sudhir9@gmail.com
M. S. Bhat
e-mail: bhatshreyank@gmail.com
H. M. Tanvi
e-mail: tanvihm97@yahoo.com
© Springer Nature Singapore Pte Ltd. 2021
N. N. Chiplunkar and T. Fukao (eds.), Advances in Artificial Intelligence
and Data Engineering, Advances in Intelligent Systems and Computing 1133,
https://doi.org/10.1007/978-981-15-3514-7_73
975