An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy

in data communication is a very important concern today. It is used in almost every region like e-commerce, education, and industry and data warehouse. Securely sending and receiving data in the above area is an important as the data is crucial. Image security plays an important role in this age. As the demand of image based message sending is improving day by day. In this paper, we have proposed an efficient image cryptography system based on RC6. The key size and number of variable rounds makes RC6 more secure. The key size is variable up to 2040 bits. The results are achieved in terms of entropy and correlation coefficients. The less variation in entropy is achieved from our approach. KeywordsChaos, Steganography, Security Measures. So in the ensuing segment we talk about data encryption method for picture encryption. We additionally talk about the pivotal angles which are utilized as a part of picture encryption with their points of interest and drawbacks. At long last taking into account the discourses we additionally recommend some future comment which may be productive in this bearing. There are niacumerous essential techniques which are second- hand pervasive cryptography, for example, private or mystery key cryptography, open fundamental or kilter, computerized mark, and hash capacities (15). In private key cryptography, a solitary key is leftover for both encryption and decoding. This obliges meander if all else fails part convey offering an impersonation of the key and the key be struck by be passed swear off a safe channel to the next individual (13-22). Private-key calculations are level indestructible and effectively actualized in equipment. Along these lines they are over and again second-hand for mass measurements encryption. The vast please of the all-around adjusted encryption rely on upon plaintext, encryption calculation, key and unscrambling calculation. The plaintext is the size ahead requiring the encryption calculation. It is joining of the inputs to the encryption calculation. The encryption calculation is the calculation used to continue on b deal with the information stranger plaintext to figure relieve. The mystery key is a comparable to repel of the encryption calculation and of the plaintext and it is associate of the encryption's inputs calculation (23)(24). The figure content is the defiant content discover as yield (14)(15). The steganography technique with cryptography will enhance the security as the cryptic content and the randomization quality can be improved.

[1]  Pallavi Jain,et al.  A Secure Data Sharing and Communication with Multiple Cloud Environments with Java API , 2012 .

[2]  Arun Patro,et al.  Design and Implementation of Enhanced version of MRC6 algorithm for data security , 2015 .

[3]  Wilhelm Burger,et al.  Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.

[4]  Asoke Nath,et al.  MODIFIED MULTI WAY FEEDBACK ENCRYPTION STANDARDVER-2(MWFES-2) , 2013 .

[5]  Ioannis Pitas,et al.  Digital watermarking: An overview , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[6]  P. S. Patheja,et al.  Attack Detection in Watermarked Images with PSNR and RGB Intensity , 2013 .

[7]  A. K. Dubey,et al.  Knowledge discovery with a subset-superset approach for Mining Heterogeneous Data with dynamic support , 2012, 2012 CSI Sixth International Conference on Software Engineering (CONSEG).

[8]  Christof Paar,et al.  An instruction-level distributed processor for symmetric-key cryptography , 2005, IEEE Transactions on Parallel and Distributed Systems.

[9]  Abhijit Mitra,et al.  A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .

[10]  Nikolaos G. Bourbakis,et al.  A General Cryptanalysis of Permutation-Only Multimedia Encryption Algorithms , 2004 .

[11]  Seetaiah Kilaru,et al.  An effective algorithm for Image security based on Compression and Decomposition method , 2013 .

[12]  L Vitali Andrea,et al.  Video over IP using standard-compatible multiple description coding: an IETF proposal , 2006 .

[13]  Yicong Zhou,et al.  A new chaotic system for image encryption , 2012, 2012 International Conference on System Science and Engineering (ICSSE).

[14]  Satish Bhalshankar,et al.  Audio Steganography: LSB Technique Using a Pyramid Structure and Range of Bytes , 2015, ArXiv.

[15]  Modular Arithmetic in RSA Cryptography , 2015 .

[16]  Prasanta K. Panigrahi,et al.  Wavelets: Applications to image compression-I , 2005 .

[17]  Yongdong Wu,et al.  On the security of an SVD-based ownership watermarking , 2005, IEEE Transactions on Multimedia.

[18]  Chun-Ta Li,et al.  A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service , 2015, 2015 International Conference on Information Networking (ICOIN).

[19]  Erkan Besdok,et al.  Hiding information in multispectral spatial images , 2005 .

[20]  Aloka Sinha,et al.  A technique for image encryption using digital signature , 2003 .

[21]  Aman Jantan,et al.  Image Encryption Using Block-Based Transformation Algorithm , 2008 .

[22]  Ahmad Abusukhon,et al.  A novel network security algorithm based on private key encryption , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[23]  Asoke Nath,et al.  Multi Way Feedback Encryption Standard ver-3(MWFES-3) , 2013, 2013 Third World Congress on Information and Communication Technologies (WICT 2013).

[24]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[25]  Anil Khandelwal,et al.  A Critical Review on Data Clustering in Wireless Network , 2014 .

[26]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[27]  A. K. Dubey,et al.  Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment , 2012, 2012 CSI Sixth International Conference on Software Engineering (CONSEG).

[28]  Frank Y. Shih,et al.  An adjusted-purpose digital watermarking technique , 2004, Pattern Recognit..

[29]  T. Aaron Gulliver,et al.  Secret Key Generation Using Chaotic Signals Over Frequency Selective Fading Channels , 2015, IEEE Transactions on Information Forensics and Security.

[30]  Namrata Shukla,et al.  Data Mining based Result Analysis of Document Fraud Detection , 2014 .

[31]  Reza Boostani,et al.  CVC: Chaotic visual cryptography to enhance steganography , 2014, 2014 11th International ISC Conference on Information Security and Cryptology.

[32]  Mohamed Fahim Hassan Synchronization of hyperchaotic systems with application to secure communication , 2015, 2015 Annual IEEE Systems Conference (SysCon) Proceedings.

[33]  Hsien-Yu Lee The implementation and investigation of securing web applications upon multi-platform for a single sign-on functionality , 2016 .

[34]  Rajarathnam Chandramouli,et al.  Secret key estimation in sequential steganography , 2005, IEEE Transactions on Signal Processing.