scispace - formally typeset
Search or ask a question
Author

Amal Joshy

Bio: Amal Joshy is an academic researcher. The author has contributed to research in topics: Encryption & Key (cryptography). The author has an hindex of 1, co-authored 1 publications receiving 5 citations.

Papers
More filters
Proceedings ArticleDOI
01 Nov 2017
TL;DR: An android application having a method to transform the text into an image using an RGB substitution and then encrypt the resulting image using AES encryption algorithm is proposed, which when implemented will lead to a highly secured transmission of the text.
Abstract: In this less secure cyber world, our proposed system will provide a way to transfer the data more securely. In this paper, we propose an android application having a method to transform the text into an image using an RGB substitution and then encrypt the resulting image using AES encryption algorithm. In this approach the secret key is smartly sent along with the cipher text in a single transmission. So that this method is capable of solving the key exchange problem that normally arises in encryption models. The encryption and decryption process make use of a combination database on both sender and receiver side, for text to image transformation. On this encrypted image, one more pixel is added, which stores the value of combinational number that was used to transform the text into image. The key which was used with the AES algorithm is transformed into its equivalent RGB resultant value. Finally the resultant value and image generated are transferred to the destination host. Reverse steps are applied at the receiver side to perform decryption. The proposed system which when implemented will lead to a highly secured transmission of the text.

11 citations


Cited by
More filters
Proceedings ArticleDOI
01 Jul 2019
TL;DR: Combination of Least Significant Bit (LSB) - Advanced Encryption Standard (AES) - Base64 is proposed in this study to provide protection for messages and various file formats embedded in digital images.
Abstract: Many people use the internet in their daily communication. But the risks of data theft on the internet are quite high, so sending security is a very important thing for data. Cryptography and steganography is a technique used to secure data to minimize data theft and access by unauthorized people. Combination of Least Significant Bit (LSB) - Advanced Encryption Standard (AES) - Base64 is proposed in this study to provide protection for messages and various file formats embedded in digital images. Secret messages are encrypted with the AES and Base64 methods before being inserted into the image using the LSB method. The study also analyzed the performance of the LSB-AES-Base64 combination of algorithms on various files and the size of the cover image. Cover images used an image with RGB channels. For measurement of imperceptibility performance used Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), and histogram analysis. Based on the results of testing, the proposed method can work well with the value of PNSR and MSE in a very good category. The stego image histogram is also identic to the original image.

14 citations

Proceedings ArticleDOI
01 Apr 2020
TL;DR: This survey sheds light on the recent work carried out on encrypting a text into an image based on the RGB color value and held a comparison between them based on various factors evolved from the literature.
Abstract: Data encryption techniques are important for answering the question: How secure is the Internet for sending sensitive data. Keeping data secure while they are sent through the global network is a difficult task. This is because many hackers are fishing these data in order to get some benefits. The researchers have developed various types of encryption algorithms to protect data from attackers. These algorithms are mainly classified into two categories namely symmetric and asymmetric encryption algorithms. This survey sheds light on the recent work carried out on encrypting a text into an image based on the RGB color value and held a comparison between them based on various factors evolved from the literature.

14 citations

Journal ArticleDOI
TL;DR: This paper aim is to highlights and elaborates the methods used in image security, and explores the way of applying the algorithms and the problem statements.
Abstract: The need of data security is increasing day by day as the requirement of communication industry and other aspects of communication. This paper aim is to highlights and elaborates the methods used in image security. It also explores the way of applying the algorithms and the problem statements. Based on this a detail analysis has been presented and

2 citations

Proceedings ArticleDOI
18 Sep 2021
TL;DR: In this article, the authors proposed an encryption method in text that adopts the chaotic method which is popularly used in 2D matrices such as images, which has properties of determinism, randomness, sensitivity to initial conditions and ergodicity.
Abstract: This research proposes an encryption method in text that adopts the chaotic method which is popularly used in 2D matrices such as images. Chaos methods such as Arnold's Cat Map (ACM) have properties of determinism, randomness, sensitivity to initial conditions and ergodicity. In addition, this method also uses permutation, diffusion and confusion models. A slight modification to the text by converting it to binary 8-bits every 8 characters can form a 2-dimensional matrix with a size of 8 x 8, making it easy to perform ACM operations. ACM operation, combined with the substitution method with modulus operation, improves message encryption from various kinds of differential and statistical attacks. The results are proven by several tools such as entropy analysis, avalance effect (AE), and bit error ratio (BER).

1 citations

Journal ArticleDOI
TL;DR: A symmetric data encryption algorithm developed in Python to encrypt images, making the transmission secure is presented in this article , the major computations performed in the algorithm are Mix Columns, Key dependent ex-or operation with upper and lower triangular sections of the matrix, Shift Rows, and Customized Sub Bytes transformation which provides diffusion and confusion.
Abstract: Internet a network of interconnected systems which is used to transmit different kinds of sensitive data is made secure by encrypting this data during transmission and protecting it against any kind of violation. This paper presents a symmetric data encryption algorithm developed in Python to encrypt images, making the transmission secure. The major computations performed in the algorithm are Mix Columns, Key dependent ex-or operation with upper and lower triangular sections of the matrix, Shift Rows, and Customized Sub Bytes transformation which provides diffusion and confusion. Results of various analysis performed on the algorithm prove its authenticity, confidentiality, and integrity.

1 citations