blog
media download page
Essay / Study of Color-Coded Cryptography secure and immune to attacks. Cryptography uses encryption and decryption techniques to ensure the privacy and security of information sharing between systems. Encryption turns plain text into ciphertext, and decryption turns ciphertext into plain text. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get Original Essay One of the techniques to implement cryptography using color, known as color-coded cryptography, is revealed in this article, which is used for encryption and decryption of data. presents text in colored blocks by grouping binary digits and assigning colors to them along with the Huffman coding scheme which is used for lossless data compression. Index Terms: Cryptography, Huffman Coding, Encryption, Decryption, Color Coding.IntroductionCryptography means secret writing in which we apply data encryption and decryption techniques to convert the data into scrambled form to protect it from attacks external data when transferring from one system to another. Color-coded encryption is a technique for implementing a symmetric system for security purposes. The symmetric system is implemented through encryption of the text by converting it to image format. To reduce the size of the image file, compression techniques should be implemented at the encryption stage. The reverse decryption process is used at the destination to generate the original text from the colored image upon receipt. Ciphertext security relies on the following two elements: The power of the cryptographic algorithm. Confidential key The confidential key is the most common authentication technique. This technique is more susceptible to various cyber attacks such as phishing, dictionary attacks, brute force attacks, spyware attacks, etc. This key is used to encrypt the message and send it to the recipient. When the recipient receives this message, he decrypts it with his confidential information. key that no one can access. This technique is used to protect sensitive data using two keys, when sent over an insecure system such as the Internet. Color-coded cryptography is one such technique that allows text to be encrypted in such a way that decryption is done via image to text conversion. Color-coded encryption process Data encryption Data encryption translates data into another form, so only people with access to a decryption key can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is referred to as plaintext. There are two types of data encryption: symmetric encryption, in which the same key is used by the sender to encrypt the data and by the recipient to decrypt the data. The key is shared. Asymmetric encryption uses different keys for encryption and decryption. The purpose of data encryption is to protect digital data from attacks when stored on computer systems and transmitted over the Internet or other computer networks. The following method is used to convert the text to colors on the side of theencryption: ASCII based coding using colors The following method of ASCII based coding scheme using colors is used by. In RGB-256 color mode, a pixel is represented by 24 bits, of which 8 bits represent the intensity of each color. For example, a color (80, 121, 150) is represented by (01010000 01111001 10010110) implemented by. Taking the first 8 bits, or in this case 01010000: ignoring the MSB bit, the remaining 7 bits or the first 128 parts of the color are used to denote a character in the ASCII table. In this way, three different characters can be designated by a single color. Thus, a text document is converted into a coded file filled with colored dots. By using the coding concepts above, large amounts of text can be compressed and transmitted more securely. This concept of ASCII based method to represent characters and color code them is used in the proposed system. Lossless Text Compression Text compression requires that the combination of compression and decompression methods be lossless, otherwise the data cannot be restored to its original format. Data compression via textual substitution method is used in. Designing data compression schemes involves adjustments between various factors, including the degree of compression, the amount of distortion introduced; whether you use a lossy compression algorithm and the computing resources required to compress and decompress the data. The following method is used for lossless text compression in source-end color-coded encryption implemented by Huffman: Huffman Coding Compression Algorithm The Huffman Coding Algorithm is an optimal compression algorithm. compression algorithm in which the frequency of individual letters is used to compress the data. The idea behind the algorithm is that if you have certain letters that are more frequent than others, it makes sense to use fewer bits to encode those letters than to encode the less frequent letters. This algorithm builds the ascending tree using the frequency of each letter or symbol. First, each letter starts as part of its own tree and the trees are ordered according to the frequency of letters in the original string. Then the two least frequently used letters are combined into a single tree, and the frequency of that tree is set to be the combined frequency of the two trees it connects. This new tree is reinserted into the list of trees at its sorted position. The process is then repeated, treating trees with more than one element the same as any other tree, except that their frequencies are the sum of the frequencies of all the letters on the leaves. It is simply the sum of the left and right children of any node, because each node stores frequency information on its own children. The process ends when all trees have been combined into one tree. This tree describes Huffman compression coding. Basically, a tree is built from the bottom up: we start with 256 trees and end with a single tree with 256 leaves and 255 internal nodes. The tree has an interesting property: the frequencies of all internal nodes combined will give the total number of bits needed to write the encoded file.Proposed SystemWe propose a cryptographic encryption and decryption method called Color-Coded Cryptography which uses the color and Huffman compression. techniques for compressing data. It is a symmetrical system that involves encrypting text by converting it into colors. Eachmessage character is encrypted in color blocks. The reverse process is used to produce the original text from the colors on the receiver side. Advantages of the proposed system Each character of the plain text is replaced by a block of color from the 18 decillion colors available in the world and upon receipt, the ciphertext block (in color) is decrypted into a block of plain text. It is resistant to issues like Meet in the middle attack, Birthday attack, and brute force attacks. The size of plain text is also reduced when encrypted, without loss. The space occupied by the ciphertext in the buffer is very small; transmission via a channel is therefore very fast, which subsequently reduces the transport cost. System Design and Operation The problem definition is to propose a system capable of performing lossless data compression on binary data using encryption and decryption. It also functions as a solution to user's data protection needs, playing an important role in environments where data privacy is critical, thereby contributing to information security. Encoding and compression schemes need to be computationally and functionally efficient and should seek to provide an optimal solution to the problems mentioned above. The system must be able to take inputs in the form of text files whose binary representation is processed and thus encrypted into a color image. One of the compression methods suitable for data compression, known as Huffman coding, is used on the encrypted data to ensure a good fit between the tasks performed and the spatial complexity issues involved. The design is expected to achieve the most promising compression ratio, with the limited resources of current computers. As a result, there are strict constraints on the memory usage and compression speed of the design. The system currently aims to work with text files in standard ASCII format. The system works on both sides: On the sender's side, this technique compresses the file using Huffman coding and then encodes the data from the binary file into a color-coded encrypted JPEG image file. . On the receiver side, it does the opposite, i.e. decrypts the image then decompresses it, bringing back the binary text file. Sender-side encryption process Image color-coded encoder Huffman compressor Text message vector Fig. 1 Fig. 1 shows the block diagram of the encryption system on the sender side. Given a stored text file that needs to be encrypted and compressed, the system first converts the file into its binary representation. This is then passed to the Huffman compressor which performs compression on the binary data transforming it into a vector. The vector is then passed as input to the encryption process, which then takes the digital vector data and transforms it into a color-coded JPEG image. The encrypted image features a series of colored blocks. The color assignment process is predetermined and is done by grouping three bits of the binary data stream at a time, thus giving the possibility of having 8 colors in total. Receiver-side decryption process text Huffman decompressor Color-coded decoder image vector Fig. 2 At the receiving end, the system takes the encrypted image as input, which it accesses for restoration. The system checks the color of different blocks iteratively and then takes an average of the values to get a practical perspective of the color of the particular block. Through this decryption process, it recreates the vector data. The data.
Navigation
« Prev
1
2
3
4
5
Next »
Get In Touch