Blowfish Encryption Using Key Secured Block Based Transformation
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 3
Abstract
Encryption is a process of converting a one form of information in another form which is hard to understand .Now a days, a large amount of information get transfer with wired or wireless network. Information contents may be textual data or image data. Therefore encryption of text or image is most important during secure transmission of information. Images are widely used in several processes like military field, medical imaging, video conferencing where confidentiality about image information is very important. As we know, pixels in plain image are strongly correlated. Image information get perceive due to this high correlation. Most of available image encryption algorithms are used for encryption of pixel information only but key secured block based transformation technique change the position of pixels and provide low correlation among image pixels so that less amount of information get perceived . The block transformation algorithm divides the image in to no. of blocks and shuffles their position of blocks to decrease the Correlation and increase its entropy value. Divide an image in more no. of blocks gives the more security of image. Transformation table will decide new positions of blocks. The aim of Key secured block transformation is to enhance the security of an image. Here, key provide a security for transformation table .Different keys generated for different types of image so ,if input image data changed automatically key will also get change. Here key is used for two purposes, one for to build transformation table and second to encrypt image data. So as key changed, transformation table will also get change and image get transformed with this new transformation table. Block Transformed image is then passed for encryption process. Here we used Blowfish image encryption algorithm because of variable and longest key size. At the receiver side these blocks are retransformed in to their original position and performed a decryption process which gives the original image.
Authors and Affiliations
Mrs. Dhanashri M. Torgalkar
An Effective Implementation of Load Balanced Routing Scheme for Wireles
Wireless mesh network is emerged as a response to the growing demand for high throughput multimedia applications over wireless mesh networks. The core technology invo each other’s packet in a multi hop fashion. M...
Removal of Colour and COD from Reactive Green – 19 Dyeing Wastewater using Ozone
Ozone is mainly used in the Advanced Oxidation Processes (AOP’s) refers to a set of chemical treatment procedures designed to remove organic and inorganic materials in dye industry wastewater by Ozonation process....
A Study on Interface Shear Strength Variability and Probability of failure of Land Filled Stability Analysis
Now a day’s failure of modern landfills by slippage of lining materials is common. The majority of failures are controlled by slippage at interfaces between lining components. Information and variability of interf...
AN EXPERT DIAGNOSIS OF BRAIN HEMORRHAGE USING ARTIFICIAL NEURAL NETWORKS
The fundamental motivation behind this study is to identify the brain hemorrhage and to give accurate treatment so that a human life can be saved due to brain hemorrhage. Brain hemorrhage is a type of stroke which is ca...
Consistent Query Answering in Inconsistent Databases
These days it is more common to build integrated or federated databases that draw data from multiple, autonomous and distributed sources. The problem of data integration is nevertheless consistent query answering...