Design and Analysis of Secure and Efficient Image with Embedded Sensitive Information Transferring Technique using Blowfish Algorithm

Kaki Leela Prasad*, Pilaka Anusha**, G. Jyothi***, K. Dileepkumar****
*-**** Department of Information Technology, Vignan's Institute of Information Technology, Visakhapatnam, India.
Periodicity:June - August'2016
DOI : https://doi.org/10.26634/jit.5.3.8135

Abstract

The usage of internet is in all aspects like Railway Reservations, Air Ticketing etc. Drastically, there is a lack of security in real time operations. Hackers crack the passwords usually by using few attacks like shoulder surfing attacks, phishing attacks, online guessing attacks, and brute force attacks. To overcome these attacks there already exists image based passwords like captcha technologies pass points and cued recall in providing solutions up to certain range, but it reduces the efficiency by loading huge images while generating the passwords. To overcome this, the authors proposed a new secure and efficient image with Embedding Sensitive Information Transferring Technique using Blowfish Algorithm for Key Generation.

Keywords

RSA (Rivest, Shamir and Adelman) Public Key Encryption Technology, AES (Advanced Encryption Standard), DES (Data Encryption Standard), CARP (Common Address Redundancy Protocol), LSB (Least Significant Bit).

How to Cite this Article?

Prasad. K. L, Anusha. P , Jyothi. G and Dileepkumar. K (2016). Design and Analysis of Secure and Efficient Image with Embedded Sensitive Information Transferring Technique using Blowfish Algorithm. i-manager’s Journal on Information Technology, 5(3), 1-8. https://doi.org/10.26634/jit.5.3.8135

References

[1]. Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, and Ning Xu, (2014). “ACM Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems”. IEEE Transaction on Information Forensic and Security, Vol. 9, No. 6.
[2]. G. Sudheer Reddy, G. Venkata Prasad, and V. Hari Prasad, (2014). “Graphical Secure Password Method against Online Password Hackers (Guessing Attacks)”. IJCSNS International Journal of Computer Science and Network Security, Vol. 14, No. 8.
[3]. Brijesh Kumar Singh, Nidhi Sharma, Neha Singla, Nikita Sharma, and Neetu Choudhary, (2014). “Image Encryption Using Block-Based Transformation Algorithm”. IJISET- International Journal of Innovative, Science, Engineering &Technology, Vol. 1, No. 3.
[4]. Vinay Sahu, and Kamlesh Lahre, (2013). “A New Technique for enhancing Image Protection Using Digital Watermarking”. IJITEE, Vol. 3.
[5]. Prerna Parmar, and Neeru Jindal, (2014). “Image Security with Integrated Watermarking and Encryption”. IOSR-JECE, Vol. 9.
[6]. Gurmeet Kaur and Aarti Kochhar, (2012). “A Steganography Implementation based on LSB&DCT”. IJSETT, Vol. 4, No. 1, pp. 35-41.
[7]. Israa Tahseen and Shatha Habeeb, (2012). “Proposal New Approach for Blowfish Algorithm by Using Random Key Generator”. Journal of Madent Alelem College, Vol. 4, No. 1, pp. 1-10.
[8]. Ratinder Kaur and V. K. Banga, (2012). “Image Security using Encryption based Algorithm”. International Conference on Trends in Electrical, Electronics and Power Engineering (ICTEEP'2012), pp. 110-112.
[9]. B. Geethavani, E.V. Prasad and R. Roopa, (2013). “A New Approach for Secure Data Transfer in Audio Signals Using DWT”. IEEE.
[10]. Monika Agrawal and Pradeep Mishra, (2012). "A Modified Approach for Symmetric Key Cryptography Based on Blowfish Algorithm”. International Journal of Engineering and Advanced Technology, Vol. 1, No. 6, pp. 79-83.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.