International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 1 - Issue 6, July 2012 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Cryptography Using An Image

[Full Text]



Yousuf Ibrahim Khan, Saad Mahmud sonyy, S.M. Musfequr rahman, Debasis baishnab, Md. Fuad bin rashid



Index Terms— ANN, Cryptography, Character recognition, Image processing, Image acquisition, Hill Cipher, Matrix, MATLAB



Abstract- An information is a message which is received and understood. Information can be sent one person to another over a long range but the process of sending information must be done in a secure way especially in case of a private message. Mathematicians and Engineers have historically relied on different algorithmic techniques to secure messages and signals. Cryptography, to most people, is concerned with keeping communications private. Indeed, the protection of sensitive communications has been the emphasis of cryptography throughout much of its history. Sometimes it is safer to send a message using an image and thus cryptography can also be done using images during an emergency. The need to extract information from images and interpret their contents has been one of the driving factors in the development of image processing and cryptography during the past decades. In this paper, a simple cryptographic method was used to decode a message which was in an image and it was done using a popular computational software.



[1] Baxes, G.A., “Digital Image Processing: Principles and Applications”, New York, NY: John Wiley & Sons, Inc, 1994.

[2] Haykin, S., Neural Networks: A Comprehensive Foundation”, New York, NY: Macmillan College Publishing Company, Inc, 1994.

[3] Kartalopoulos, S.V, “Understanding Neural Networks and Fuzzy Logic, Basic Concepts and Applications.” New York, NY: the Institute of Electrical and Electronics Engineers, Inc., 1996.

[4] Kasabov, N.K., “Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering”, Cambridge, MA: The MIT Press,1996.

[5] c.c. Yang, s.o. Prasher, j.a. Landry, h.s. Ramaswamy and a. Ditommaso, “Application of artificial neural networks in image recognition and classification of crop and weeds”, Canadian Agricultural Engineering, Vol. 42, No. 3, July/August/September, 2000.

[6] Rejean Plamondon, Sargur N. Srihari, “On line and Off line Handwriting Recognition: A comprehensive survey”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol 22, No.1, January, 2000.

[7] Oge Marques, “Practical Image And Video Processing Using Matlab”, Wiley-IEEE Press, 2011.

[8] H. Delfs, H. Knebl, “Introduction to Cryptography : Principles and Applications”, 2nd Edition, Springer-Verlag, 2007.

[9] H. Anton, C. Rorres, “Elementary Linear Algebra : Applications Versions”, 9th Edition, John Wiley & Sons, Inc. 2006-2007.

[10] Lester S. Hill, “Cryptography in an Algebraic Alphabet,” American Mathematical Monthly, 36, pp. 306-312, June-July 1929.

[11] Lester S. Hill, “Concerning Certain Linear Transformation Apparatus of Cryptology,” American Mathematical Monthly, 38, pp. 135-154, March 1931.

[12] David H. Wolpert, Kagan Tumer, “ A Survey of Collective Intelligence” NASA Ames Research Center, 1999.

[13] P.Y. Oh, “TRIPOD—Computer vision for classroom instruction and robot design,” AAAI, Stanford University, CA, Tech. Rep. SS-04-01, pp. 42–47, 2004.

[14] B. Earl Wells, “Evaluation Of Advanced Computing Techniques And Technologies: Reconfigurable Computing”, NASA Faculty Fellowship Program, NASA Marshall Space Flight Center, Alabama, 2002.