Full Paper View Go Back

Data Encryption Technique based on Enhancement of Blowfish Algorithm in Comparison of DES & DCT Methods

Vikas Singhal1 , Devendra Singh2 , Sanjai Kumar Gupta3

  1. School of Computer Science & Engineering, IFTM University, Moradabad, UP, India.
  2. School of Computer Science & Engineering, IFTM University, Moradabad, UP, India.
  3. Bundelkhand Institute of Engineering & Technology, B.I.E.T., Jhansi, UP, India.

Section:Research Paper, Product Type: Journal-Paper
Vol.11 , Issue.3 , pp.16-21, Jun-2023


Online published on Jun 30, 2023


Copyright © Vikas Singhal, Devendra Singh, Sanjai Kumar Gupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vikas Singhal, Devendra Singh, Sanjai Kumar Gupta, “Data Encryption Technique based on Enhancement of Blowfish Algorithm in Comparison of DES & DCT Methods,” International Journal of Scientific Research in Computer Science and Engineering, Vol.11, Issue.3, pp.16-21, 2023.

MLA Style Citation: Vikas Singhal, Devendra Singh, Sanjai Kumar Gupta "Data Encryption Technique based on Enhancement of Blowfish Algorithm in Comparison of DES & DCT Methods." International Journal of Scientific Research in Computer Science and Engineering 11.3 (2023): 16-21.

APA Style Citation: Vikas Singhal, Devendra Singh, Sanjai Kumar Gupta, (2023). Data Encryption Technique based on Enhancement of Blowfish Algorithm in Comparison of DES & DCT Methods. International Journal of Scientific Research in Computer Science and Engineering, 11(3), 16-21.

BibTex Style Citation:
@article{Singhal_2023,
author = {Vikas Singhal, Devendra Singh, Sanjai Kumar Gupta},
title = {Data Encryption Technique based on Enhancement of Blowfish Algorithm in Comparison of DES & DCT Methods},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {6 2023},
volume = {11},
Issue = {3},
month = {6},
year = {2023},
issn = {2347-2693},
pages = {16-21},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3140},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3140
TI - Data Encryption Technique based on Enhancement of Blowfish Algorithm in Comparison of DES & DCT Methods
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Vikas Singhal, Devendra Singh, Sanjai Kumar Gupta
PY - 2023
DA - 2023/06/30
PB - IJCSE, Indore, INDIA
SP - 16-21
IS - 3
VL - 11
SN - 2347-2693
ER -

145 Views    195 Downloads    44 Downloads
  
  

Abstract :
Cryptographic methods or techniques are mathematical operations used to encrypt plaintext into cipher text and vice versa. The improved security of the encrypted message; the algorithm can be improved based on its complexity and the secrecy of the key used to encrypt and decrypt the message. Cryptosystems are a combination of cryptographic based algorithms, keys, and protocols that work together to provide secure communication. The strength of the encrypted data relies by improving the security of the cryptographic algorithm and how the key is secured during transmission over a network. The cryptographic algorithm should be strong enough for preventing the unauthorized access by keeping the key as secret to ensure that only the authorized people are able to access the encrypted data. Encryption of the data is a crucial step in securing data. Implementing the Blowfish algorithm and comparing its performance with the DES algorithm can provide insights into the strengths and weaknesses of both algorithms. By giving the data and key as input to the encryption block, the Blowfish algorithm can encrypt the data to protect its confidentiality. The comparison with DCT can also highlight the trade-offs between performance, security, and implementation complexity. The research in this paper has focused on the enhancement of Blowfish algorithm for securing the content in plaintext and file message using encryption techniques. The performance for Blowfish algorithm can be intensified by minimizing the rounds in reference with increasing the block length of fixed length by using the transformation model.

Key-Words / Index Term :
DES, DCT, AES, LSB, Blowfish

References :
[1]. David A. Huffman, ?A Method for the Construction of Minimum - Redundancy Codes?, Proceedings of the I.R.E., September, pp.1098–1102, 1952.
[2]. M. Kharrazi, H. T. Sencar, N. Memon, Image Steganography: Concepts and Practice, Lecture Note Series, Institute for Mathematical sciences, National University of Singapore, 2004.
[3]. W. Pennebaker and J. Mitchell. ?JPEG STILL IMAGE DATA COMPRESSION STANDARD". van Nostrand Reinhold, 1993.
[4]. L. Marvel ?Image Steganography for Hidden Communication". Ph.D. Dissertation, Univ. of Delaware, Dept of EE, 1999.
[5]. Robert T. McKeon ?Strange Fourier Steganography in Movies?, Proceedings of IEEE EIT 2007.
[6]. R. Gonzalez and R. Woods, ?Digital Image Processing?, Sec. Edition. Pp.373-374.
[7]. S. Mallat, ?A theory for multiresolution signal decomposition: the wavelet representation?, IEEE Pattern Anal. and Machine Intell., Vol.11, No.7, pp.674-693, 1989.
[8]. Marcelloni, Francesco, and Massimo Vecchio. "A simple algorithm for data compression in wireless sensor networks." Communications Letters, IEEE, Vol.12, no.6, pp.411-413, 2008.
[9]. Srisooksai, Tossaporn, Kamol Kaemarungsi, Poonlap Lamsrichan, and Kiyomichi Araki. "EnergyEfficient Data Compression in Clustered Wireless Sensor Networks using Adaptive Arithmetic Coding with Low Updating Cost."International Journal of Information and Electronics Engineering Vol.1, no.1, pp.85-93, 2011.
[10]. Xi Xu et al. [2012]: Image Compression Using Radon Transform With DCT : Performance Analysis. International Journal of Scientific Engineering and Technology. Vol.2, Issue.8, pp.759- 765, 2012.
[11]. Dong-U Lee et al. [2009]: Precision-Aware Self-Quantizing Hardware Architectures for the Discrete Wavelet Transform, IEEE Vol.21, 2009.
[12]. Dolfus, Kirsten, and Torsten Braun. "An evaluation of compression schemes for wireless networks." In Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 International Congress on, IEEE, pp.1183-1188. 2010.
[13]. A Survey on Data Compression in Wireless Sensor Network Naoto Kimura and Shahram Latifi Electrical and Computer Engineering, University of Nevada, Las Vegas{naoto, latifi}@egr.unlv.edu International Conference on Information Technology: Coding and Computing (ITCC’05) IEEE 2000.
[14]. Medeiros, Henry Ponti, Marcos Costa Maciel, Richard Demo Souza, and Marcelo Eduardo Pellenz. "Lightweight Data Compression in Wireless Sensor Networks Using Huffman Coding." International Journal of Distributed Sensor Networks 2014.
[15]. Liang, Yao. "Efficient temporal compression in wireless sensor networks." InLocal Computer Networks (LCN), 2011 IEEE 36th Conference on, IEEE, pp.466-474. 2011.
[16]. Marcelloni, Francesco, and Massimo Vecchio. "A simple algorithm for data compression in wireless sensor networks." Communications Letters, IEEE Vol.12, Issue.6, pp.411-413, 2008.
[17]. Paar, Christof. "Applied cryptography and data security." Lecture Notes), Ruhr-Universität Bochum (http://www. crypto. ruhr-uni-bochum. de), 2000.
[18]. Hager, Creighton TR, Scott F. Midkiff, Jung-Min Park, and Thomas L. Martin. "Performance and energy efficiency of block ciphers in personal digital assistants." In Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on, IEEE, pp.127-136, 2005.
[19]. Agarwal, Navita, and Himanshu Sharma. "An Efficient Pixel-shuffling Based Approach to Simultaneously Perform Image Compression, Encryption and Steganography." International Journal of Computer Science and Mobile Computing (IJCSMC) 2, no. 5, pp.376-385, 2013.
[20]. M. P. R. Kamble, M. P. S. Waghamode, M. V. S. Gaikwad, and M. G. B. Hogade, “Steganography techniques: A review,” International Journal of Engineering, Vol.2, no. 10, 2013.
[21]. H. Inoue, A. Miyazaki, and T. Katsura, “An image watermarking method based on the wavelet transform,” in Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348), IEEE, Vol.1, pp.296–300, 1999.
[22]. K. Raja, K. Kumar, S. Kumar, M. Lakshmi, H. Preeti, K. Venugopal, and L. M. Patnaik, “Genetic algorithm based steganography using wavelets,” in International Conference on Information Systems Security. Springer, pp. 51–63, 2007.
[23]. C.-K. Chan and L.-M. Cheng, “Hiding data in images by simple lsb substitution,” Pattern recognition, Vol.37, no.3, pp.469–474, 2004.
[24]. R. El Safy, H. Zayed, and A. El Dessouki, “An adaptive steganographic technique based on integer wavelet transform,” in 2009 International Conference on Networking and Media Convergence. IEEE, pp.111–117, 2009.
[25]. A. M. Fard, M.-R. Akbarzadeh-T, and F. Varasteh-A, “A new genetic algorithm approach for secure jpeg steganography,” in 2006 IEEE International Conference on Engineering of Intelligent Systems. IEEE, pp.1–6, 2006.
[26]. D. R. ElShafie, N. Kharma, and R. Ward, “Parameter optimization of an embedded watermark using a genetic algorithm,” in 2008 3rd International Symposium on Communications, Control and Signal Processing. IEEE, pp.1263–1267, 2008.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation