Authors :
Krishnapriya P V, Smitha Suresh
Volume/Issue :
Volume 2 - 2017, Issue 6 - June
Google Scholar :
https://goo.gl/nsUwi6
Scribd :
https://goo.gl/5a9hY3
Thomson Reuters ResearcherID :
https://goo.gl/3bkzwv
Abstract :
Encrypting data is a way to protect the data or to prevent the unauthorized access of data by others and these data can be text, image audio,video or anything. In order to protect data from unauthorized access a new concept is introduced and this is based on linear feedback shift register method. In this method two step encryption is provided to give more security to the data. The encrypted image can be decoded in the decryption stage. In the encryption stage the LFSR will generate random numbers to reorder positions of each pixels in the row of the image . After row encryption, column need to be encrypted by again generating random numbers using LFSR to reorder each pixels in the column of the image .Then we use XOR operation to shuffle all pixels to get the final encrypted image.To decrypt the image , reverse operation of encryption is performed . First step in the decryption process is XOR execution and then decrypt the column encrypted image and finally decrypting row encrypted image to reconstruct the original image.
Keywords :
Linear Feedback shift Register, Encryption, Decryption,XOR,Random generator.
Encrypting data is a way to protect the data or to prevent the unauthorized access of data by others and these data can be text, image audio,video or anything. In order to protect data from unauthorized access a new concept is introduced and this is based on linear feedback shift register method. In this method two step encryption is provided to give more security to the data. The encrypted image can be decoded in the decryption stage. In the encryption stage the LFSR will generate random numbers to reorder positions of each pixels in the row of the image . After row encryption, column need to be encrypted by again generating random numbers using LFSR to reorder each pixels in the column of the image .Then we use XOR operation to shuffle all pixels to get the final encrypted image.To decrypt the image , reverse operation of encryption is performed . First step in the decryption process is XOR execution and then decrypt the column encrypted image and finally decrypting row encrypted image to reconstruct the original image.
Keywords :
Linear Feedback shift Register, Encryption, Decryption,XOR,Random generator.