Blowfish Encryption Using Key Secured Block Based Transformation

Abstract

 Encryption is a process of converting a one form of information in another form which is hard to understand .Now a days, a large amount of information get transfer with wired or wireless network. Information contents may be textual data or image data. Therefore encryption of text or image is most important during secure transmission of information. Images are widely used in several processes like military field, medical imaging, video conferencing where confidentiality about image information is very important. As we know, pixels in plain image are strongly correlated. Image information get perceive due to this high correlation. Most of available image encryption algorithms are used for encryption of pixel information only but key secured block based transformation technique change the position of pixels and provide low correlation among image pixels so that less amount of information get perceived . The block transformation algorithm divides the image in to no. of blocks and shuffles their position of blocks to decrease the Correlation and increase its entropy value. Divide an image in more no. of blocks gives the more security of image. Transformation table will decide new positions of blocks. The aim of Key secured block transformation is to enhance the security of an image. Here, key provide a security for transformation table .Different keys generated for different types of image so ,if input image data changed automatically key will also get change. Here key is used for two purposes, one for to build transformation table and second to encrypt image data. So as key changed, transformation table will also get change and image get transformed with this new transformation table. Block Transformed image is then passed for encryption process. Here we used Blowfish image encryption algorithm because of variable and longest key size. At the receiver side these blocks are retransformed in to their original position and performed a decryption process which gives the original image.

Authors and Affiliations

Mrs. Dhanashri M. Torgalkar

Keywords

Related Articles

 STRESS ANALYSIS & REVERSE ENGINEERING ON ADAMS AND PUNCH CLASP: AN ORTHODONTIC APPLIANCE

 Orthodontic appliances are used for the treatment of malocclusions of a tooth or group of teeth. These appliances is retained in oral cavity with the help of its integral component known as Clasp which engages the...

CONTRA bT  - CONTINUOUS FUNCTION IN SUPRA TOPOLOGICAL SPACES

In this paper, we introduce the concept of contra bT  - continuous functions and contra bT  - irresolute. We obtain the basic properties and their relationship with other forms of contra supra continuous fu...

 AUTOMATIC CAR LICENSE PLATE EXTRACTION

 License plate extraction is an important stage in the vehicle license plate recognition for an automated transport system. This paper presents a novel and practical license plate extraction algorithm based on the...

 NONDESTRUCTIVE DIAGNOSIS OF A PARTICLE ACCELERATOR FOR MEDICAL USE

 Our goal is to use thermal imaging to diagnose a particle accelerator used in medicine. This technic can track its operating status and detect breakdowns and failures. The accelerator is used in the Regional Cance...

 Assessment of Water Quality of Hasdeo River , Korea district, Chhattisgarh: with special reference to Pollution due to Coal mines

 An investigation was undertaken to study of physical & chemical properties of Hasdeo river water at Korea district have been carried out and The parameters studied were pH, total alkalinity, total hardness, ch...

Download PDF file
  • EP ID EP95443
  • DOI -
  • Views 89
  • Downloads 0

How To Cite

Mrs. Dhanashri M. Torgalkar (30).  Blowfish Encryption Using Key Secured Block Based Transformation. International Journal of Engineering Sciences & Research Technology, 3(3), 1774-1780. https://europub.co.uk./articles/-A-95443