Image Encryption Using Blowfish Algorithm
Image Encryption Using Blowfish Algorithm
Image Encryption Using Blowfish Algorithm
cryptography. The proposed method called “Image original image and key image to fuse-defuse. The image of
Encryption using Blowfish Algorithm” is an encryption and GUI is shown in Fig. 1.
decryption technique. It is based on Blow Fish algorithm with
additional security layer to provide extra security while
sending and receiving images and sensitive data. This
proposed model is designed to process any type of images
(i.e., .jpg, .png, etc.). The proposed method consists of 4
phases in encryption and decryption. They are:
Confusion Diffusion Part:
1) Input Original Image
2) Key Image
3) Fusion of Both Image
4) Generate Fused Image
Encryption Part:
1) Input Fused Image
2) Input Secret Key
3) Generate Encrypted Image Fig. 1: GUI of the developed system
Decryption Part:
1) Input Encrypted Image B. Confusion Diffusion UI
2) Input Secret key After the User login, User first input original image through
3) Get Fused Image browsing local files. To generate the fused image, key image
Confusion Diffusion Part: (it can be any image) is needed to fuse with original image.
1) Input Original Image After that he can generate the fused image as shown in fig. 2.
2) Key Image
3) Separation of Image
4) Get Original Image
REFERENCES
[1] A.M.Yousif, M.M.Ali,"A Selective Image Encryption
Based on Chaos Algorithm", Journal of Kerbala
University, Vol. 11 No.1, p136-p149 Scientific, 2013.
[2] Han Shuihua and Yang Shuangyuan, "An Asymmetric
Image Encryption Based on Matrix Transformation ",
ecti transactions on computer and information
technology vol.1, no.2 november 2005.
[3] B. Schneier, “Description of a new variable-length key,
64-bit block cipher (Blowfish)”; Fast Software
Encryption, Cambridge Security Workshop Proceedings,
Springer-Verlag, 1994, pp. 191- 204.
[4] Zhao Xue-feng, “Digital Image Scrambling Based on the
Baker’s Transformation”, Journal of Northwest Normal
Fig. 4: Snap of Email Sending UI.
University (Natural Science), Vol 39, No. 2, pp. 26-29.
[5] Bao Guan-jun, Ji Shi-ming, and Shen Jian-bin, “Magic
IV. EXPERIMENTAL RESULTS
Cube Transformation and Its Application in Digital
The proposed system has been tested on more than 20 images Image Encryption”, Computer Applications, Vol 22, No.
for Image Encryption. We consider a dataset of some users 11, pp. 23-25,
taken as sample, which consists of name, e-mail, and the [6] M. Ali Bani Younes and A. Jantan, "Image encryption
password. The software was executed in two different laptops using block-based transformation algorithm" in IAENG
and a desktop, and was tested independently. The evaluation International Journal of Computer Science, Volume 35,
results of the proposed system were verified and were found Issue 1, 2008.
to be cent percent accurate. All of the encrypted images was [7] Sandeep Bhowmik Sriyankar Acharyya “Image
accurately recovered. Cryptography:The Genetic Algorithm Approach”
Computer Science and Automation Engineering
(CSAE), 2011 IEEE International Conference pp 223 -
227
[8] www.Oracle.com (Basic Information of Oracle 9i and
Pdfs)
[9] www.cs.ucl.ac.uk (Project Planning And Scheduling)
Fig. 4: Results after encryption of image [10] www.engin.umd.umich.edu (Software Testing
Strategies)
[11] www.GeekInterview.com (Introductions and
V. CONCLUSION
Differences)
In this paper, a new method has been suggested for encrypting
images by using the blowfish encryption algorithm and
confusion-diffusion function. User is provided with an easy
interface, which helps him to encrypt decrypt image and can
send image using email. The system is designed to cater the
need of vast population, also it is easy to install and use.
Experimental results clearly depict the robustness and
correctness of the proposed system, proven to be invariant of
color, brightness and affine transformations. Various images
are used in experiments and performance measures are
recorded. In addition to that security factor is also analyzed.
ACKNOWLEDGEMENT
First of all, I would love to give my regards to the almighty
GOD, my parents who are more than GOD for me and all
family member for making me a human being and for making
me able to make my dream comes true. It gives me an
immense feeling of great pleasure and most sincere regards
and sense of gratitude to my guide for his brilliant and
valuable guidance for completing this project. I am very
much grateful to my guide “Mr. Abhishek Agnihotri” for his
valuable suggestion, helping hand and guidance experienced
to me. I am thankful to my guide for his guidance and the
encouragement me for time to time.