{"title":"A Peculiar Image Encryption Technique For Mobile Application","authors":"R. Krithika, J. Ponsam","doi":"10.1109/ICCCI56745.2023.10128518","DOIUrl":null,"url":null,"abstract":"The upgradation in the field of mobile applications is predominantly increasing. Nowadays mobile applications are used in various platforms on one-handled devices in addition, attackers can use similar technology to anonymize their malicious behaviors and hide their identification of behaviors. Thus, security is important. In this project, we are focusing on the precautionary encryption and decryption algorithms like PNSR metric and Elliptic curve Digital signature algorithm which help us to provide secured transmission of a personal image between the mobile stations. Based on these algorithms a defense application will be developed. There are 4 different levels of technology that will be applied in this project which help to improve security transmission. The first level is selecting a secret image. The secret image will support file types like jpg,png. In the second level of security, we encode the image that we get from thefirst level using an encryption algorithm. Here the image quality is measured by using PSNR metric, the third level is finding the LSB, along with 3m (Mean,Mean,Mode) of the image to hide the message inside the cover image. Then the obtained stegnographic image is compressed using GZIP is the final security level. An Elliptic curve, a Digital signature algorithm is used to enhancea security process. Therefore, this method is suggested to send a secret message through applications of special importance across the mobile application.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI56745.2023.10128518","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The upgradation in the field of mobile applications is predominantly increasing. Nowadays mobile applications are used in various platforms on one-handled devices in addition, attackers can use similar technology to anonymize their malicious behaviors and hide their identification of behaviors. Thus, security is important. In this project, we are focusing on the precautionary encryption and decryption algorithms like PNSR metric and Elliptic curve Digital signature algorithm which help us to provide secured transmission of a personal image between the mobile stations. Based on these algorithms a defense application will be developed. There are 4 different levels of technology that will be applied in this project which help to improve security transmission. The first level is selecting a secret image. The secret image will support file types like jpg,png. In the second level of security, we encode the image that we get from thefirst level using an encryption algorithm. Here the image quality is measured by using PSNR metric, the third level is finding the LSB, along with 3m (Mean,Mean,Mode) of the image to hide the message inside the cover image. Then the obtained stegnographic image is compressed using GZIP is the final security level. An Elliptic curve, a Digital signature algorithm is used to enhancea security process. Therefore, this method is suggested to send a secret message through applications of special importance across the mobile application.