Enhanced Blowfish Algorithm For Image Encryption and
Enhanced Blowfish Algorithm For Image Encryption and
Enhanced Blowfish Algorithm For Image Encryption and
41
International Journal of Computer Applications (0975 – 8887)
Volume 146 – No.5, July 2016
It has two modules such as encrypt and decrypt as shown in Swap xL and xR
figure 1. The encrypt module is used to hide visual After the sixteenth round, swap xL and xR again to undo the
information. last swap.
The decrypt module is used to get the hidden visual Step 5: Then, xR = xR XOR P17 and xL = xL XOR P18.
information as original image. It takes the cipher image file as
an input and gives original image asan output. Step 6: Finally, recombine xL and xR to get the cipher image.
In addition to that, the algorithm generates sub keys as 3.1 Image Decryption With The Secret Key
follows: Decryption
Decryption process precedes the following steps.
Blow Fish uses a large number of sub keys. These keys must
be pre - computed before any data encryption or decryption. Step 1: Initialize S Box and T Box as arrays.
The P-array consistsof1832-bit subkeys: Step 2: Secret key comparison between original key which is
created while encryption.
P1, P2,..., P18.
Step 3: The input is a 64-bit data element, x.
There are four 32-bit S-boxes with 256 entries each:
Step 4: Divide x into two 32-bit halves: xL, xR.
S0,0, S0,1,..., S0,255;
Then, for i = 1 to 16: xL = xL
S1,0, S1,1,..,, S1,255; XOR Pi xR = F(xL)XOR xR
Swap xL and xR
S2,0, S2,1,..., S2,255;
After the sixteenth round, swap xL and xR again to undo the
last swap.
S3,0, S3,1,..,, S3,255.
Step 5: Then, xR = xR XOR P17 and xL = xL XOR P18.
Generating the Sub keys :
Step 6: Finally, recombine xL and xR to get the original
The sub keys are calculated in the following way.
image.
1. Initialize P-array and four S-boxes with a fixed string.
This string contains the hexadecimal digits of pi (less the 4. EXPERIMENTAL RESULTS AND
initial 3): P0 = 0x243f6a88, P1 = 0x85a308d3, P2 = FINDINGS
0x13198a2e, etc. The proposed image encryption technique has been developed
2. XOR P0and the first 32 bits of the key, XOR P1and the in java language and various images are used to test the
second 32-bits of the key, and so on for all bits of the performance of the proposed system. The image samples used
key. Repeatedly continue through the key bits upto the for testing are listed in table 1.
whole P-array has been XORed with key bits. Table 1 List of image files used for encryption
3. Encrypt all-zero string using Blowfish algorithm, with
the sub keys given in steps (1) and (2). FILE ID FILE NAME FILE SIZE (KB)
42
International Journal of Computer Applications (0975 – 8887)
Volume 146 – No.5, July 2016
10 Cheque.bmp 6900 36549 Based on the observation, it has been identified that the size of
original and encrypted images are varied from one another.
2. Memory Size Figure2 – 7 show the visual representation (Screen Shots) of
The size of image files is measured before and after encryption process.
encryption to observe the memory consumption. Table 3 lists
out different image files and their size before and after
encryption.
43
International Journal of Computer Applications (0975 – 8887)
Volume 146 – No.5, July 2016
44
International Journal of Computer Applications (0975 – 8887)
Volume 146 – No.5, July 2016
45
International Journal of Computer Applications (0975 – 8887)
Volume 146 – No.5, July 2016
46
International Journal of Computer Applications (0975 – 8887)
Volume 146 – No.5, July 2016
47
International Journal of Computer Applications (0975 – 8887)
Volume 146 – No.5, July 2016
48
International Journal of Computer Applications (0975 – 8887)
Volume 146 – No.5, July 2016
[12] Ismail Amr Ismail, et.al ,”A Digital Image Encryption [25] S.S.Maniccam and N.G.Bourbakis, “Lossless image
Algorithm Based a Composition of Two Chaotic Logistic compression and encryption using SCAN”, Pattern
Maps”, International Journal of Network Security, Recognition 34, 1229- 1245,2001.
Vol.11, No.1, PP.1 -10, July 2010.
[26] Sesha Pallavi, et.al ,“Permutation based Image
[13] Jawahar Thakur and Nagesh Kumar,DES, AES and Encryption Technique”, International Journal of
Blowfish: Symmetric Key Cryptography Algorithms Computer Applications (0975 – 8887) Volume 28 ,No.8,
Simulation Based Performance Analysis, International 2011.
Journal of Emerging Technology and Advanced
Engineering, 2011. [27] Seyed Mohammad Seyedzade, et.al , “A Novel Image
Encryption Algorithm Based on Hash Function”, 6th
[14] Jiancheng Zou , et.al , Dongxu Qi, “A New Digital Iranian Conference on Machine Vision and Image
Image Scrambling Method Based on Fibonacci Processing, 2010.
Number,”Proceeding of the IEEE Inter Symposium On
Circuits and Systems,Vancouver ,Canada ,Vol .03 , PP [28] Shuqun Zhang and Mohammed A. Karim, “Color image
.965-968 , 2004. encryption using double random phase encoding”,
Microwave and Optical Technology Letters Vol. 21, No.
[15] Kamali, S.H., et.al “A new modified version of Advance 5, 318-322 , June 5 1999.
Encryption Standard based algorithm for image
encryption”,Electronics and Information Engineering [29] Song, Z., et.al, “A secure and efficient fingerprint
(ICEIE), 2010, International Conference . images encryption scheme”. In Young Computer
Scientists, 2008. The 9th International Conference for
[16] M. Zeghid,et.al, “A Modified AES Based Algorithm for (pp. 2803-2808). IEEE.
Image Encryption”, World Academy of Science,
Engineering and Technology 27, 2007. [30] Tariq Shah, Iqtadar Hussain, Muhammad Asif Gondal ,
Hasan Mahmood, “Statistical analysis of S-box in image
[17] Mohammad Ali Bani Younes and Aman Jantan, “An encryption applications based on majority logic
Image Encryption Approach Using a Combination of criterion”, International Journal of the Physical Sciences
Permutation Technique Followed by Encryption” , Vol. 6(16), pp. 4110-4127.
IJCSNS International Journal of Computer Science and
Network Security, VOL.8 , April 2008. [31] Wang Ying, Zheng DeLing, Ju Lei, et al., “The Spatial-
Domain Encryption of Digital Images Based on High-
[18] Monika Agrawal and Pradeep Mishra,” A Comparative Dimension Chaotic System”, Proceeding of 2004 IEEE
Survey on Symmetric Key Encryption Techniques”, Conference on Cybernetics and Intelligent Systems,
International Journal on Computer Science and Singapore, pp. 1172-1176, December. 2004.
Engineering (IJCSE), Vol. 4 No. 05 May 2012, PP877-
882. [32] Cryptography www.cryptographyworld.com/concept.htm
[19] Pia Singh and Prof. Karamjeet Singh “Image Encryption [33] K.Kanagalakshmi and M.Mekala, “A Review on Image
And Decryption Using Blowfish Algorithm In Matlab”, Encryption Techniques”, National Conference on
International Journal of Scientific & Engineering “Recent Developments and Applications in Computer
Research, Volume 4, Issue 7, July-2013. Science”, 152, 2016, ISBN : 978-93-82570-73-8.
49
International Journal of Computer Applications (0975 – 8887)
Volume 146 – No.5, July 2016
9. APPENDIX - I
Screen shots of the sensitive data
50
International Journal of Computer Applications (0975 – 8887)
Volume 146 – No.5, July 2016
51
International Journal of Computer Applications (0975 – 8887)
Volume 146 – No.5, July 2016
IJCATM : www.ijcaonline.org
52