Grid-based Image Encryption using Code-based Cryptography

Authors

  • Dian Anggoro Putro Bhagaskoro Telkom University
  • Ari Moesriami Barmawi Telkom University

DOI:

https://doi.org/10.34818/INDOJC.2020.5.3.493

Abstract

Recently, image is frequently sent or exchanged electronically, such that image security is important. A method for securing images is using RSA. However, RSA needs more time for securing an image. For overcoming the RSA problem, McEliece Cryptosystem is introduced to grid-based image encryption. The image is divided into blocks and each block is divided into grids, then finally McEliece Cryptosystem is applied to the pixels in the grids. Based on the experiment’s result, it was proven that the execution time of the proposed method is less than the previous one, while maintaining the security.

Keywords: McEliece Cryptosystem, RSA, Image Encryption, Image Decryption, Grid 

Downloads

Download data is not yet available.

References

El-Deen, A., El-Badawy, E. and Gobran, S., 2014. Digital image encryption based on RSA algorithm. J. Electron. Commun. Eng, 9(1), pp.69-73.

Singh, B.K. and Gupta, S.K., 2015. Grid-based Image Encryption using RSA. International Journal of Computer Applications, 115(1).

Chaladze, G. Kalatozishvili L. 2017. Linnaeus 5 Dataset for Machine Learning.

Dambra, A., Gaborit, P., Roussellet, M., Schrek, J. and Tafforeau, N., 2014. Improved Secure Implementation of McEliece Signature Schemes on Embedded Devices. IACR Cryptology ePrint Archive, 2014, p.163.

Rivest, R.L., Shamir, A. and Adleman, L., 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), pp.120-126.

Mceliece, R.J., 1978. A public-key cryptosystem based on algebraic. Coding Thv, 4244, pp.114-116

Zhao, G., Yang, X., Zhou, B. and Wei, W., 2010, July. RSA-based digital image encryption algorithm in wireless sensor networks. In 2010 2nd International Conference on Signal Processing Systems (Vol. 2, pp. V2-640). IEEE.

Stinson, D.R. and Paterson, M., 2018. Cryptography: Theory and Practice. CRC Press.

Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P. and Natarajan, P., 2013. Local Shannon entropy measure with statistical tests for image randomness. Information Sciences, 222, pp.323-342.

Katz, J., Menezes, A.J., Van Oorschot, P.C. and Vanstone, S.A., 1996. Handbook of applied cryptography. CRC press.

Downloads

Published

2021-01-09

How to Cite

Bhagaskoro, D. A. P., & Barmawi, A. M. (2021). Grid-based Image Encryption using Code-based Cryptography. Indonesian Journal on Computing (Indo-JC), 5(3), 1–14. https://doi.org/10.34818/INDOJC.2020.5.3.493

Issue

Section

Computer Science