An Enhance Security of the Color Image Using Asymmetric RSA Algorithm

The development of computer networks generates several advantages in the cyber world. Because of this nice advancement, these days networking facilities are offered at terribly low cost. However, sadly this quick access becomes a threat to data security.

  • PDF / 791,028 Bytes
  • 8 Pages / 439.37 x 666.142 pts Page_size
  • 103 Downloads / 241 Views

DOWNLOAD

REPORT


An Enhance Security of the Color Image Using Asymmetric RSA Algorithm Shreya Agrawal, Mayank Patel, and Amit Sinhal

1 Introduction The image is that the communication mode is most employed in completely different fields like medical field, analysis field, industry, military space, etc.. The vital transfer of pictures can crop up in an unsecured Web network. Therefore, there is a necessity for acceptable security in order that the image prevents access by the unauthorized person to special data. The advantage of the image is that it covers more multimedia data and needs protection [1]. In currently going on years with the high advancement of digital technology and also the scope of rights in the online broadens. Interests also end up in a series of negatives effects, as an example data larceny, piracy, etc. Digital image has been wide used in people’s lives it’s a lots of integral and your safety is a lot of important. Currently, the protection of photography has become a very important issue within the field of computer [2]. Secure connections via insecure channels, such as the Web, have been a revenue goal associated with research since the start of the digital age. With the continued development of symmetrical and asymmetric key coding, digital communication across the network is created in a secure and personal way [3]. Cryptography may be a kind of image security technique; it offers the secure method of transmittal and storing the image on the net. Security is the main concern of any system to maintain the integrity, confidentiality, and authenticity of the image. Although cryptography is the efficient method, it also faces the problem of security if data with gray levels are more numerous [4]. S. Agrawal (B) · M. Patel · A. Sinhal Department of Computer Science and Engineering, Geetanjali Institute of Technical Studies (GITS), Udaipur, India e-mail: [email protected] M. Patel e-mail: [email protected] A. Sinhal e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2021 S. D. Purohit et al. (eds.), Proceedings of International Conference on Communication and Computational Technologies, Algorithms for Intelligent Systems, https://doi.org/10.1007/978-981-15-5077-5_25

279

280

S. Agrawal et al.

2 Image Encryption Nowadays, we tend to hear the word cryptography in virtually every place. Cryptography is that technique of encrypting a message or data exceedingly, and there are various methods that exclusively approved parties can access and folks unauthorized cannot do so. In other words, encryption is a method or mechanism that allows you to hide your message or data so that only authorized people can access it. The two-key encryption scheme includes two uses: public and personal keys. Using the public key, the plain text is converted into the encrypted text, and this process is called encryption. The encryption process is done at the sender end. At the receiving end, get the original plaintext from the encrypted text using the private key and this method is called decryption. In order to pr