Đang chuẩn bị liên kết để tải về tài liệu:
RC4 enrichment algorithm approach for selective image encryption
Không đóng trình duyệt đến khi xuất hiện nút TẢI XUỐNG
Tải xuống
This paper is introduces RC4 Enrichment Algorithm Approach for selective image encryption. This approach is derived from the standard RC4 algorithm. RC4 algorithm is already used for image encryption and also for the selective image encryption. Currently RC4 is vulnerable. | ISSN:2249-5789 Pramod Kumar et al, International Journal of Computer Science & Communication Networks,Vol 2(2), 181-189 RC4 Enrichment Algorithm Approach for Selective Image Encryption Pramod Kumar Pushpendra Kumar Pateriya MTech Student(CSE) Assistant Professor(CS) Lovely Professional University Lovely Professional University Phagwara, India Phagwara, India kcpramodkumar@gmail.com pushpendra.mnnit@gmail.com Abstract This paper is introduces RC4 Enrichment Algorithm Approach for selective image encryption. This approach is derived from the standard RC4 algorithm. RC4 algorithm is already used for image encryption and also for the selective image encryption. Currently RC4 is vulnerable. Lots of cryptanalytic found the lots of weakness, vulnerable point and attacks inside the RC4 algorithm. So in this concern, this paper has worked. This paper has designed the RC4 based new enrichment approach to making strong the RC4 algorithm, “PC1-RC4”. This approach is based on new KSA and PRGA algorithm process, which are the two stages inside the RC4 algorithm. Keywords: Rivest Cipher 4 (RC4), PC1RC4, Encryption, Decryption, Selective. 1. INTRODUCTION Presently, the communication via multimedia components are the current demanded in most of the application. The text, images, video and audio are the component of the multimedia which used for the communication. In this paper, main concerned the image component of multimedia. The image is also become the main component as text used for communication. The image is used in internet, multimedia systems, medical, and telemedicine, military for the purpose of communication [1]. Other side, question is, communication via the images is secure if the secret and sensitive images is transmitted over the network? The answer of this question is not secure because of the attacker and intruder may be attack on the images, secretes and sensitiveness of the images can be disclose to the unauthorized person. Now from this concern, .