SlideShare a Scribd company logo
Image Cryptography using Nearest Prime
Pixels
Abstract:
Protecting the data in a safe and secure way which does not impede the access of an
authorized authority is an immensely difficult and very interesting research problem. image
cryptography is a special type of encryption technique to obscure image-based secret information
which can be decrypted by Human Visual System. Communication is the process of transmitting
information from source to destination. The exchanging information should not be stolen by
unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing
of the information visual cryptography techniques are used. This paper proposes a novel method
for key generation by using nearest prime pixels. Further 2’s complement and logical operations
are performed to generate decrypted image. The final decrypted image is generated by
representing pixels in matrix form and data is retrieved in column wise.
Keywords—Image Cryptography; Nearest prime pixels; 2’s complement; XOR operation.
1. Introduction:
Image cryptography [1] is a cryptographic technique where visual information (Image, text, etc)
gets encrypted in such a way that the decryption can be performed by the human visual system
without aid of computers. Cryptography is used to constrain the potential sender and/or receivers
of a message. Cryptography is based on secrets called keys. The sender can encode its message
so that it can only decode with suitable key.
Here are some of the services that are provided by the security.
• Confidentiality(privacy)
• Authentication(who created or sent the data)
• Data integrity(has not been altered)
• Non-repudiation(the order is final)
• Access control(prevent misuse of resources)
• Availability (permanence, non-erasure).
2. Background:
Image cryptography was originally invented and pioneered by Moni Naor and Adi Shamir in
1994 at the Euro crypt conference. Image cryptography is “a new type of cryptographic scheme,
which can be decode concealed images without any cryptographic computation”. As the name
suggests, image cryptography is related to images. Naor and Shamir’s initial implementation
assumes that the image or message is a collection of black and white pixels, each pixel is handled
individually and it should be noted that the white pixel represents the transparent color. Image
cryptography mechanism is very secure and very easily implemented. This is another advantage
of image cryptography over the other popular conditionally secure cryptographic schemes. An
electronic secret can be shared directly, alternatively the secrets can be printed out onto
transparencies and superimposed, revealing the secret. The piece of secret is known as share. The
secret can only be reconstructed when a sufficient number of shares are combined together.
While these shares are separate, no information about the secret can be accessed. That is, the
shares are completely useless while they are separated. There are many types algorithms which
will include in image cryptography with different concepts and techniques to enhance the
security.
3. Proposed system:
The proposed work generates a 8-bit random sequence for key generation. Key[2] is obtained by
performing subtraction between digital values and its nearest prime pixel values.Several stages
are involved in encryption and decryption.
A. Key Generation: The Each pixel of image converted into pixels. Further find nearest
prime of it. For key generation find the difference between nearest prime pixel and for each pixel
of image. Consider the difference value as key, it is continued for each and every pixel of image.
Key generation algorithm steps:-
Step1: Initially, the given image is converted into its equivalent digital pixels.
Step2: Find nearest prime pixels for each pixel of image.
Step3: The key values are obtained from finding difference between pixel values and nearest
prime pixel values.
Step4: Perform 2’s complement for generated pixels.
Fig.1 Flow chart showing key generation process Example for key generation:
4. SOFTWARE AND HARDWARE REQUIREMENTS :
➢ Operating system : Windows XP/7.
➢ Coding Language : MATLAB
➢ Tool : MATLAB R 2012
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
➢ System : Pentium IV 2.4 GHz.
➢ Hard Disk : 40 GB.
➢ Floppy Drive : 1.44 Mb.
➢ Monitor : 15 VGA Colour.
➢ Mouse : Logitech.
➢ Ram : 512 Mb.
5. Conclusion:
Image cryptography [5,6] is playing vital role in current trends. This paper focusing on novel key
generation using nearest prime pixels. Further different complementary and logical functions are
used to improve the secrecy. Finally cipher image is generated with column wise retrieving. This
work may be extended with genetic operators and genetic algorithms.
[1] S. Kiran, R. Pradeep Kumar Reddy, “Multi-Stage Encryption using Seeded SDES”
International Journal of Advanced Networking and Applications Volume: 07 Issue: 02 Pages:
2694-2699 (2015) ISSN: 0975- 0290.
[2] B.Bazith Mohammed, “automatic key generation Of Caesar cipher”, international journal of
Engineering trends and technology (IJETT), vol.6, no.6, pp.337-339, dec.2013.
[3] S.G.Srikantaswamy and Dr.H.D.phaneendra,“A Cipher design using the combined effect of
arithmetic And logic operations with substitutions and Transposition techniques“, International
Journal of Computer Applications (0975-8887), vol.29, no.8, pp.34-36.
[4] A. Sinha and K. Singh, “Image encrypt ion by using fractional Fourier transform and Jigsaw
transform in image bit planes”, Source: optical engineering, spie-int society optical engineering,
vol. 44, no. 5, (2005), pp. 15- 18.
[5] N. Taneja, B. Raman and I. Gupta, “Combinational domain encryption for still visual data”,
Journal of Multimedia Tools and Applications, DOI 10.1007/s11042-011-0775-4, (2011).

More Related Content

PDF
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
PDF
Lossless and reversible data hiding in encrypted images with public key crypt...
DOCX
Secure reversible image data hiding over encrypted domain via key modulation
PDF
DIP Using Image Encryption and XOR Operation Affine Transform
DOCX
Designing an efficient image encryption then-compression system via predictio...
PDF
Fx3610771081
DOCX
designing an efficient image encryption-then-compression system via predictio...
DOCX
Reversible data hiding in encrypted images by reserving room before encryption
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
Lossless and reversible data hiding in encrypted images with public key crypt...
Secure reversible image data hiding over encrypted domain via key modulation
DIP Using Image Encryption and XOR Operation Affine Transform
Designing an efficient image encryption then-compression system via predictio...
Fx3610771081
designing an efficient image encryption-then-compression system via predictio...
Reversible data hiding in encrypted images by reserving room before encryption

What's hot (19)

PDF
separable reversible data hiding in encrypted image
PPTX
Reversible data hiding in encrypted images by reserving room before encryption
DOCX
Lossless and reversible data hiding in encrypted images with public key crypt...
PDF
11.data security using cryptosteganography in web application
DOCX
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
PPTX
Reversible image data hiding over encrypted domain using key modulation
PDF
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
PDF
Review paper on Data Security using Cryptography and Steganography
PPTX
E-Fraud Prevention based on self-authentication of e-documents
PPTX
Learnable Image Encryption
PDF
Reversible Data Hiding in Encrypted Image: A Review
PDF
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
PPTX
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
PDF
Security System for Data Using Steganography and Cryptography (SSDSC)
PDF
Keyless approach of separable hiding data into encrypted image
PDF
Secure image encryption using aes
PDF
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
PDF
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
PDF
International Journal of Engineering Research and Development
separable reversible data hiding in encrypted image
Reversible data hiding in encrypted images by reserving room before encryption
Lossless and reversible data hiding in encrypted images with public key crypt...
11.data security using cryptosteganography in web application
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
Reversible image data hiding over encrypted domain using key modulation
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Review paper on Data Security using Cryptography and Steganography
E-Fraud Prevention based on self-authentication of e-documents
Learnable Image Encryption
Reversible Data Hiding in Encrypted Image: A Review
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
Security System for Data Using Steganography and Cryptography (SSDSC)
Keyless approach of separable hiding data into encrypted image
Secure image encryption using aes
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
International Journal of Engineering Research and Development
Ad

Similar to Image Cryptography using Nearest Prime Pixels (20)

PDF
Image Cryptography using Nearest Prime Pixels
PDF
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
PDF
B017640811
PDF
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
PDF
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
PDF
Jz3118501853
PDF
Encryption-Decryption RGB Color Image Using Matrix Multiplication
DOCX
Image encryption using aes key expansion
PDF
Unified Approach With Neural Network for Authentication, Security and Compres...
PDF
RC4 Technique in Visual Cryptography
PDF
Image Encryption Techniques Using Fractal Function : A Review
PDF
Image Encryption Techniques Using Fractal Function : A Review
PDF
A novel steganographic scheme based on
PDF
Variable length key based visual
PDF
Survey on Different Image Encryption Techniques with Tabular Form
PDF
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
PDF
Design and Implementation of Visual Cryptography System for Transmission of S...
PDF
New Technique for Image Encryption Based on Choas and Change of MSB
PDF
Color Image Encryption and Decryption Using Multiple Chaotic Maps
PDF
Image encryption
Image Cryptography using Nearest Prime Pixels
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
B017640811
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
Jz3118501853
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Image encryption using aes key expansion
Unified Approach With Neural Network for Authentication, Security and Compres...
RC4 Technique in Visual Cryptography
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
A novel steganographic scheme based on
Variable length key based visual
Survey on Different Image Encryption Techniques with Tabular Form
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
Design and Implementation of Visual Cryptography System for Transmission of S...
New Technique for Image Encryption Based on Choas and Change of MSB
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Image encryption
Ad

More from muhammed jassim k (20)

PDF
Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
PDF
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
PDF
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
PDF
4.weather based smart watering system using soil sensor and gsm
PDF
26. qo s ranking prediction for cloud services
PDF
Energy-Efficient intelligent street lighting system using traffic-adaptive co...
PDF
Fire col a collaborative protection
PDF
privacy preserving abstract
PDF
Datamining with big data
PDF
33. dynamic resource allocation using virtual machines
PDF
An automated dynamic offset for network selection in heterogeneous networks
PDF
ALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware
PDF
A location-and Diversity aware News feed system for mobile user
PDF
A feature-Enriched Completely Blind image Quality Evaluator
PDF
PDF
Hierarchical supervisory control system for pe vs participating in frequency ...
PDF
On demand retrieval of crowdsourced
PDF
Medical warehouse business distribution
PDF
Discoveringlatentsemanticsinweb 160617093617
PDF
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
4.weather based smart watering system using soil sensor and gsm
26. qo s ranking prediction for cloud services
Energy-Efficient intelligent street lighting system using traffic-adaptive co...
Fire col a collaborative protection
privacy preserving abstract
Datamining with big data
33. dynamic resource allocation using virtual machines
An automated dynamic offset for network selection in heterogeneous networks
ALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware
A location-and Diversity aware News feed system for mobile user
A feature-Enriched Completely Blind image Quality Evaluator
Hierarchical supervisory control system for pe vs participating in frequency ...
On demand retrieval of crowdsourced
Medical warehouse business distribution
Discoveringlatentsemanticsinweb 160617093617
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Trump Administration's workforce development strategy
PDF
Updated Idioms and Phrasal Verbs in English subject
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Cell Structure & Organelles in detailed.
Weekly quiz Compilation Jan -July 25.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Microbial diseases, their pathogenesis and prophylaxis
Final Presentation General Medicine 03-08-2024.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Supply Chain Operations Speaking Notes -ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Orientation - ARALprogram of Deped to the Parents.pptx
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
History, Philosophy and sociology of education (1).pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Trump Administration's workforce development strategy
Updated Idioms and Phrasal Verbs in English subject
A systematic review of self-coping strategies used by university students to ...
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape

Image Cryptography using Nearest Prime Pixels

  • 1. Image Cryptography using Nearest Prime Pixels Abstract: Protecting the data in a safe and secure way which does not impede the access of an authorized authority is an immensely difficult and very interesting research problem. image cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System. Communication is the process of transmitting information from source to destination. The exchanging information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information visual cryptography techniques are used. This paper proposes a novel method for key generation by using nearest prime pixels. Further 2’s complement and logical operations are performed to generate decrypted image. The final decrypted image is generated by representing pixels in matrix form and data is retrieved in column wise. Keywords—Image Cryptography; Nearest prime pixels; 2’s complement; XOR operation. 1. Introduction: Image cryptography [1] is a cryptographic technique where visual information (Image, text, etc) gets encrypted in such a way that the decryption can be performed by the human visual system without aid of computers. Cryptography is used to constrain the potential sender and/or receivers of a message. Cryptography is based on secrets called keys. The sender can encode its message so that it can only decode with suitable key. Here are some of the services that are provided by the security. • Confidentiality(privacy) • Authentication(who created or sent the data) • Data integrity(has not been altered) • Non-repudiation(the order is final) • Access control(prevent misuse of resources)
  • 2. • Availability (permanence, non-erasure). 2. Background: Image cryptography was originally invented and pioneered by Moni Naor and Adi Shamir in 1994 at the Euro crypt conference. Image cryptography is “a new type of cryptographic scheme, which can be decode concealed images without any cryptographic computation”. As the name suggests, image cryptography is related to images. Naor and Shamir’s initial implementation assumes that the image or message is a collection of black and white pixels, each pixel is handled individually and it should be noted that the white pixel represents the transparent color. Image cryptography mechanism is very secure and very easily implemented. This is another advantage of image cryptography over the other popular conditionally secure cryptographic schemes. An electronic secret can be shared directly, alternatively the secrets can be printed out onto transparencies and superimposed, revealing the secret. The piece of secret is known as share. The secret can only be reconstructed when a sufficient number of shares are combined together. While these shares are separate, no information about the secret can be accessed. That is, the shares are completely useless while they are separated. There are many types algorithms which will include in image cryptography with different concepts and techniques to enhance the security. 3. Proposed system: The proposed work generates a 8-bit random sequence for key generation. Key[2] is obtained by performing subtraction between digital values and its nearest prime pixel values.Several stages are involved in encryption and decryption. A. Key Generation: The Each pixel of image converted into pixels. Further find nearest prime of it. For key generation find the difference between nearest prime pixel and for each pixel of image. Consider the difference value as key, it is continued for each and every pixel of image. Key generation algorithm steps:-
  • 3. Step1: Initially, the given image is converted into its equivalent digital pixels. Step2: Find nearest prime pixels for each pixel of image. Step3: The key values are obtained from finding difference between pixel values and nearest prime pixel values. Step4: Perform 2’s complement for generated pixels. Fig.1 Flow chart showing key generation process Example for key generation:
  • 4. 4. SOFTWARE AND HARDWARE REQUIREMENTS : ➢ Operating system : Windows XP/7. ➢ Coding Language : MATLAB ➢ Tool : MATLAB R 2012 SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: ➢ System : Pentium IV 2.4 GHz. ➢ Hard Disk : 40 GB. ➢ Floppy Drive : 1.44 Mb. ➢ Monitor : 15 VGA Colour. ➢ Mouse : Logitech. ➢ Ram : 512 Mb. 5. Conclusion: Image cryptography [5,6] is playing vital role in current trends. This paper focusing on novel key generation using nearest prime pixels. Further different complementary and logical functions are used to improve the secrecy. Finally cipher image is generated with column wise retrieving. This work may be extended with genetic operators and genetic algorithms. [1] S. Kiran, R. Pradeep Kumar Reddy, “Multi-Stage Encryption using Seeded SDES” International Journal of Advanced Networking and Applications Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975- 0290. [2] B.Bazith Mohammed, “automatic key generation Of Caesar cipher”, international journal of Engineering trends and technology (IJETT), vol.6, no.6, pp.337-339, dec.2013.
  • 5. [3] S.G.Srikantaswamy and Dr.H.D.phaneendra,“A Cipher design using the combined effect of arithmetic And logic operations with substitutions and Transposition techniques“, International Journal of Computer Applications (0975-8887), vol.29, no.8, pp.34-36. [4] A. Sinha and K. Singh, “Image encrypt ion by using fractional Fourier transform and Jigsaw transform in image bit planes”, Source: optical engineering, spie-int society optical engineering, vol. 44, no. 5, (2005), pp. 15- 18. [5] N. Taneja, B. Raman and I. Gupta, “Combinational domain encryption for still visual data”, Journal of Multimedia Tools and Applications, DOI 10.1007/s11042-011-0775-4, (2011).