Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Analysis and Implementation of Optimized Image Encryption Algorithm Using Bhramgupta-Bhaskara Equation


Affiliations
1 Arya Institute of Engg. & Technology, Jaipur, India
     

   Subscribe/Renew Journal


In today’s era advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern. The basic issues pertaining to the problem of encryption has been discussed and also a detailed analysis on image encryption techniques based on chaotic schemes has been dealt in the present communication. The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. Generally chaotic based cryptography is not suitable for practical application. It does not secure algorithm due to dependency of initial condition, which can be easily broken. This Algorithm is optimizing by B.B equation. Modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate algorithm that purport to solve them and how to build algorithm in whose security one can have confidence. This concept leads to techniques that can simultaneously provide security functions and an overall visual check, which might be suitable in some applications. The performance is analyzed against different encryption algorithm such as A.E.S, D.E.S and X-OR, a regular well-behaved DSR network is used as a reference. The experimental results are being studied under DVPB-HD is a rapid development platform based on TITMS320DM6467 DaVinciTM Technology. Simulation experiments have been carried out in order to evaluate performance of proposed algorithm under different input images in (k.b).
This algorithm proved secure against brute-force and plain-text attack resolve in [10].

Keywords

B-B Equation, Chaos, Cryptography, Image Encryption, Image Decryption.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 265

PDF Views: 2




  • Analysis and Implementation of Optimized Image Encryption Algorithm Using Bhramgupta-Bhaskara Equation

Abstract Views: 265  |  PDF Views: 2

Authors

Sanjay Chaudhari
Arya Institute of Engg. & Technology, Jaipur, India
Deepak Dembla
Arya Institute of Engg. & Technology, Jaipur, India

Abstract


In today’s era advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern. The basic issues pertaining to the problem of encryption has been discussed and also a detailed analysis on image encryption techniques based on chaotic schemes has been dealt in the present communication. The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. Generally chaotic based cryptography is not suitable for practical application. It does not secure algorithm due to dependency of initial condition, which can be easily broken. This Algorithm is optimizing by B.B equation. Modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate algorithm that purport to solve them and how to build algorithm in whose security one can have confidence. This concept leads to techniques that can simultaneously provide security functions and an overall visual check, which might be suitable in some applications. The performance is analyzed against different encryption algorithm such as A.E.S, D.E.S and X-OR, a regular well-behaved DSR network is used as a reference. The experimental results are being studied under DVPB-HD is a rapid development platform based on TITMS320DM6467 DaVinciTM Technology. Simulation experiments have been carried out in order to evaluate performance of proposed algorithm under different input images in (k.b).
This algorithm proved secure against brute-force and plain-text attack resolve in [10].

Keywords


B-B Equation, Chaos, Cryptography, Image Encryption, Image Decryption.