Archishman Udaysinha Zanzaney, Chaitanya Krishna Sharma, Lakshya Jain, C. Gururaj
{"title":"使用换位密码和位反转技术的视觉密码学的熟练评估","authors":"Archishman Udaysinha Zanzaney, Chaitanya Krishna Sharma, Lakshya Jain, C. Gururaj","doi":"10.1109/ICAECT54875.2022.9807843","DOIUrl":null,"url":null,"abstract":"This paper aims to secure visual information present in an image using cryptographic techniques. Transposition cipher and Bit reversal image encryption are the two techniques demonstrated in this paper and have implemented the same using python programming knowledge. The transposition cipher refers to scrambling of pixels in a key controlled manner in both horizontal and vertical ways. The used in this inscription can be provided by users. To hide information regarding the color composition of the image, a bit reversal image encryption algorithm is implemented which is a keyless encryption technique. Furthermore, this paper compares the original image and the image encrypted with transposition cipher and bit reversal technique and comparative measurements of entropy, PSNR, MSE and SSIM are computed.","PeriodicalId":346658,"journal":{"name":"2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Proficient Evaluation of Visual Cryptography using Transposition Cipher and Bit Reversal Techniques\",\"authors\":\"Archishman Udaysinha Zanzaney, Chaitanya Krishna Sharma, Lakshya Jain, C. Gururaj\",\"doi\":\"10.1109/ICAECT54875.2022.9807843\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper aims to secure visual information present in an image using cryptographic techniques. Transposition cipher and Bit reversal image encryption are the two techniques demonstrated in this paper and have implemented the same using python programming knowledge. The transposition cipher refers to scrambling of pixels in a key controlled manner in both horizontal and vertical ways. The used in this inscription can be provided by users. To hide information regarding the color composition of the image, a bit reversal image encryption algorithm is implemented which is a keyless encryption technique. Furthermore, this paper compares the original image and the image encrypted with transposition cipher and bit reversal technique and comparative measurements of entropy, PSNR, MSE and SSIM are computed.\",\"PeriodicalId\":346658,\"journal\":{\"name\":\"2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAECT54875.2022.9807843\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECT54875.2022.9807843","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proficient Evaluation of Visual Cryptography using Transposition Cipher and Bit Reversal Techniques
This paper aims to secure visual information present in an image using cryptographic techniques. Transposition cipher and Bit reversal image encryption are the two techniques demonstrated in this paper and have implemented the same using python programming knowledge. The transposition cipher refers to scrambling of pixels in a key controlled manner in both horizontal and vertical ways. The used in this inscription can be provided by users. To hide information regarding the color composition of the image, a bit reversal image encryption algorithm is implemented which is a keyless encryption technique. Furthermore, this paper compares the original image and the image encrypted with transposition cipher and bit reversal technique and comparative measurements of entropy, PSNR, MSE and SSIM are computed.