PICTURE ARITHMETIC CRYPTOSYSTEMS USING SYMMETRIC 
KEY ENCHANCED ALGORITHM WITH LEGITIMATE PICTURES 
ABSTRACT 
The secret messages passed through network are hacked and algorithms 
are not efficient to the expected level. A powerful encryption technique is 
introduced and performs a large variety of generating keys to encrypt the 
message in the form of pictures. The arithmetic operations are performed over 
the picture key to make the technique even more powerful. First encryption is 
done with the help of vigenere cipher and the key is generated through picture. 
Second encryption is done with the help of newly designed 10x26 table and the 
key is generated from the first key. The decryption is done by the reverse of 
encryption process.
EXISTING SYSTEM 
The cryptographic systems use the key to encrypt messages in the form of text or 
string. Vigenere cipher can be broken using counting diagram.Total number of combinations 
required to break the system using counting diagram is very small. Large key size makes the 
system less efficient. The secret key to perform encryption is more reliable to attack because 
it is an easily recognizable format. 
PROPOSED SYSTEM 
The encryption of the message is done using the picture key which is difficult to 
break. Total number of combinations required to break the system exceeds hundred digit 
number and more with increase in number of pictures. The system performances increases 
with increase in key size. The system uses two main operations to make the key stronger. The 
first operation is LOCK-10(Logical Crypto Key)is performed over the secret code to get the 
picture sorting key.LOCK-10 involves 10 different operations and these are performed over 
the secret code to get the picture sorting key. The operation LOCK-10 can be performed in 10 
factorial ways .The picture sorting key is obtained and the ‘N’ pictures are arranged in one of 
the ‘N’ factorial ways. The PACK(Picture Arithmetic Crypto Key) operation is performed 
over the picture key to get the first key. The second key is generated from the first key by 
performing LOCK-5 operation over the first key. The vigenere encryption is performed over 
the first key and encryption is performed over the second key with the help of 10x26 matrix. 
Increase in number of pictures used for ciphering, increases the system performance 
proportionally.
REQUIREMENT SPECIFICATIONS 
HARDWARE REQUIREMENT 
Processor : Pentium IV or above 
Ram : 512 MB 
Hdd : 80 GB 
SOFTWARE REQUIREMENT 
Operating system : windows 
Platform : c#.Net 4.0 
Front End : C Sharp

More Related Content

DOCX
Picture arithmetic cryptosystem module explanation
PDF
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
PPTX
Image encryption using aes key expansion
PDF
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
PDF
B017640811
PDF
Cryptanalysis of image encryption using traditional encryption tecnhniques
PDF
Colour Based Cryptography
PDF
Vol 14 No 1 - July 2014
Picture arithmetic cryptosystem module explanation
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
Image encryption using aes key expansion
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
B017640811
Cryptanalysis of image encryption using traditional encryption tecnhniques
Colour Based Cryptography
Vol 14 No 1 - July 2014

Similar to Picture arithmetic cryptosystem using symmetric key enhanced algorithm with legitimate pictures-abstract (20)

PDF
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
PPTX
Hillcipher and eliptic curve
PDF
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
PDF
Encryption-Decryption RGB Color Image Using Matrix Multiplication
PDF
Image and text Encryption using RSA algorithm in java
PDF
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
PDF
10.11648.j.ijdst.20160204.12
PDF
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
PPTX
ICACCI_2015_Presentation
PDF
PDF
PDF
An efficient and highly secure technique to encrypt
PDF
An efficient and highly secure technique to encrypt
PDF
An efficient and highly secure technique to encrypt
PDF
An efficient and highly secure technique to encrypt
PDF
New Technique Using Multiple Symmetric keys for Multilevel Encryption
PDF
Random Chaotic Number Generation based Clustered Image Encryption
PDF
researchpaperfinal1
PDF
Development and performance comparison of modified RSA algorithm with other c...
PDF
Image Cryptography using Nearest Prime Pixels
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
Hillcipher and eliptic curve
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Image and text Encryption using RSA algorithm in java
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
10.11648.j.ijdst.20160204.12
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
ICACCI_2015_Presentation
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
New Technique Using Multiple Symmetric keys for Multilevel Encryption
Random Chaotic Number Generation based Clustered Image Encryption
researchpaperfinal1
Development and performance comparison of modified RSA algorithm with other c...
Image Cryptography using Nearest Prime Pixels
Ad

More from hari krishnan.n (17)

PPTX
SEO-Search Engine Optimisation
PDF
Axis Bank Social Media Marketing
PPTX
Axis bank strengthens brand with progressive campaign on linkedIn
PPTX
ERP IN CLOUD
DOCX
Make science in india
PPT
Derivative Market
DOCX
Drawbacks of our Education system
PPT
Cross-cultural communication
PPTX
Chennai express- Social Media Marketing Strategy
PPT
political behavior-organisational politics,discretionary behavior,defensive b...
PPTX
I-Mode in mobile communication.
PPTX
Issues with personality tests
DOCX
Issues with personality tests
PPTX
Management productivity tools1
PPTX
Socio economic classification
PPTX
Cloud computing
PPTX
i-mode ppt and syncml
SEO-Search Engine Optimisation
Axis Bank Social Media Marketing
Axis bank strengthens brand with progressive campaign on linkedIn
ERP IN CLOUD
Make science in india
Derivative Market
Drawbacks of our Education system
Cross-cultural communication
Chennai express- Social Media Marketing Strategy
political behavior-organisational politics,discretionary behavior,defensive b...
I-Mode in mobile communication.
Issues with personality tests
Issues with personality tests
Management productivity tools1
Socio economic classification
Cloud computing
i-mode ppt and syncml
Ad

Recently uploaded (20)

PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
Civil Department's presentation Your score increases as you pick a category
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PPTX
Thinking Routines and Learning Engagements.pptx
PDF
semiconductor packaging in vlsi design fab
PDF
Laparoscopic Colorectal Surgery at WLH Hospital
PPTX
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
PPTX
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
PPTX
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PDF
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
PDF
THE CHILD AND ADOLESCENT LEARNERS & LEARNING PRINCIPLES
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PPTX
Climate Change and Its Global Impact.pptx
PDF
Compact First Student's Book Cambridge Official
PDF
Farming Based Livelihood Systems English Notes
Journal of Dental Science - UDMY (2022).pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Civil Department's presentation Your score increases as you pick a category
UNIT_2-__LIPIDS[1].pptx.................
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Thinking Routines and Learning Engagements.pptx
semiconductor packaging in vlsi design fab
Laparoscopic Colorectal Surgery at WLH Hospital
BSCE 2 NIGHT (CHAPTER 2) just cases.pptx
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
THE CHILD AND ADOLESCENT LEARNERS & LEARNING PRINCIPLES
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
Climate Change and Its Global Impact.pptx
Compact First Student's Book Cambridge Official
Farming Based Livelihood Systems English Notes

Picture arithmetic cryptosystem using symmetric key enhanced algorithm with legitimate pictures-abstract

  • 1. PICTURE ARITHMETIC CRYPTOSYSTEMS USING SYMMETRIC KEY ENCHANCED ALGORITHM WITH LEGITIMATE PICTURES ABSTRACT The secret messages passed through network are hacked and algorithms are not efficient to the expected level. A powerful encryption technique is introduced and performs a large variety of generating keys to encrypt the message in the form of pictures. The arithmetic operations are performed over the picture key to make the technique even more powerful. First encryption is done with the help of vigenere cipher and the key is generated through picture. Second encryption is done with the help of newly designed 10x26 table and the key is generated from the first key. The decryption is done by the reverse of encryption process.
  • 2. EXISTING SYSTEM The cryptographic systems use the key to encrypt messages in the form of text or string. Vigenere cipher can be broken using counting diagram.Total number of combinations required to break the system using counting diagram is very small. Large key size makes the system less efficient. The secret key to perform encryption is more reliable to attack because it is an easily recognizable format. PROPOSED SYSTEM The encryption of the message is done using the picture key which is difficult to break. Total number of combinations required to break the system exceeds hundred digit number and more with increase in number of pictures. The system performances increases with increase in key size. The system uses two main operations to make the key stronger. The first operation is LOCK-10(Logical Crypto Key)is performed over the secret code to get the picture sorting key.LOCK-10 involves 10 different operations and these are performed over the secret code to get the picture sorting key. The operation LOCK-10 can be performed in 10 factorial ways .The picture sorting key is obtained and the ‘N’ pictures are arranged in one of the ‘N’ factorial ways. The PACK(Picture Arithmetic Crypto Key) operation is performed over the picture key to get the first key. The second key is generated from the first key by performing LOCK-5 operation over the first key. The vigenere encryption is performed over the first key and encryption is performed over the second key with the help of 10x26 matrix. Increase in number of pictures used for ciphering, increases the system performance proportionally.
  • 3. REQUIREMENT SPECIFICATIONS HARDWARE REQUIREMENT Processor : Pentium IV or above Ram : 512 MB Hdd : 80 GB SOFTWARE REQUIREMENT Operating system : windows Platform : c#.Net 4.0 Front End : C Sharp