A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems

Krishna Prakasha, Rachana Kalkur, Vasundhara Acharya, Balachandra Muniyal, Mayank Khandelwal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Secure communication and Secure data transfer are one of the significant challenges in the era of Internet. With the development in information technology, there arose a need for invulnerable transfer of data. Visual Cryptography is the method in which the secrets are encoded in the form of shares which can be decrypted by overlapping the shares that are obtained. As the usage of images in the industrial process is rapidly rising, it is vital to protect the confidential image data from unauthorized access. The (2,2) Visual Cryptography scheme involves the encoding of the image to create two shares. It is later obtained through the stacking process. Further, Halftoning technique can be applied by the dithering process for the approximation of the colors in the image. It makes use of Floyd’s Steinberg Algorithm which uses the dithering process by mapping the required color from the eight color bit palette assigned. The design layout is broken down into two module. The first module is used to convert the image into a binary image, and the other module is used to pass the input image to Floyd’s Steinberg algorithm. This technique can be best suited for the application in the banking system or any other field where confidentiality is the primary concern.

Original languageEnglish
Title of host publicationSecurity in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers
EditorsSabu M. Thampi, Danda B. Rawat, Jose M. Alcaraz Calero, Sanjay Madria, Guojun Wang
PublisherSpringer Verlag
Pages578-590
Number of pages13
ISBN (Print)9789811358258
DOIs
Publication statusPublished - 01-01-2019
Event6th International Symposium on Security in Computing and Communications, SSCC 2018 - Bangalore, India
Duration: 19-09-201822-09-2018

Publication series

NameCommunications in Computer and Information Science
Volume969
ISSN (Print)1865-0929

Conference

Conference6th International Symposium on Security in Computing and Communications, SSCC 2018
CountryIndia
CityBangalore
Period19-09-1822-09-18

Fingerprint

Key Exchange
Secure Communication
Cryptosystem
Data Transfer
Data transfer
Cryptography
Color
Visual Cryptography
Binary images
Module
Information technology
Internet
Halftoning
Binary Image
Banking
Confidentiality
Stacking
Information Technology
Convert
Overlapping

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Mathematics(all)

Cite this

Prakasha, K., Kalkur, R., Acharya, V., Muniyal, B., & Khandelwal, M. (2019). A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems. In S. M. Thampi, D. B. Rawat, J. M. Alcaraz Calero, S. Madria, & G. Wang (Eds.), Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers (pp. 578-590). (Communications in Computer and Information Science; Vol. 969). Springer Verlag. https://doi.org/10.1007/978-981-13-5826-5_45
Prakasha, Krishna ; Kalkur, Rachana ; Acharya, Vasundhara ; Muniyal, Balachandra ; Khandelwal, Mayank. / A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems. Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. editor / Sabu M. Thampi ; Danda B. Rawat ; Jose M. Alcaraz Calero ; Sanjay Madria ; Guojun Wang. Springer Verlag, 2019. pp. 578-590 (Communications in Computer and Information Science).
@inproceedings{1661433536d841b48830d1e0e0ec66fb,
title = "A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems",
abstract = "Secure communication and Secure data transfer are one of the significant challenges in the era of Internet. With the development in information technology, there arose a need for invulnerable transfer of data. Visual Cryptography is the method in which the secrets are encoded in the form of shares which can be decrypted by overlapping the shares that are obtained. As the usage of images in the industrial process is rapidly rising, it is vital to protect the confidential image data from unauthorized access. The (2,2) Visual Cryptography scheme involves the encoding of the image to create two shares. It is later obtained through the stacking process. Further, Halftoning technique can be applied by the dithering process for the approximation of the colors in the image. It makes use of Floyd’s Steinberg Algorithm which uses the dithering process by mapping the required color from the eight color bit palette assigned. The design layout is broken down into two module. The first module is used to convert the image into a binary image, and the other module is used to pass the input image to Floyd’s Steinberg algorithm. This technique can be best suited for the application in the banking system or any other field where confidentiality is the primary concern.",
author = "Krishna Prakasha and Rachana Kalkur and Vasundhara Acharya and Balachandra Muniyal and Mayank Khandelwal",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-981-13-5826-5_45",
language = "English",
isbn = "9789811358258",
series = "Communications in Computer and Information Science",
publisher = "Springer Verlag",
pages = "578--590",
editor = "Thampi, {Sabu M.} and Rawat, {Danda B.} and {Alcaraz Calero}, {Jose M.} and Sanjay Madria and Guojun Wang",
booktitle = "Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers",
address = "Germany",

}

Prakasha, K, Kalkur, R, Acharya, V, Muniyal, B & Khandelwal, M 2019, A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems. in SM Thampi, DB Rawat, JM Alcaraz Calero, S Madria & G Wang (eds), Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Communications in Computer and Information Science, vol. 969, Springer Verlag, pp. 578-590, 6th International Symposium on Security in Computing and Communications, SSCC 2018, Bangalore, India, 19-09-18. https://doi.org/10.1007/978-981-13-5826-5_45

A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems. / Prakasha, Krishna; Kalkur, Rachana; Acharya, Vasundhara; Muniyal, Balachandra; Khandelwal, Mayank.

Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. ed. / Sabu M. Thampi; Danda B. Rawat; Jose M. Alcaraz Calero; Sanjay Madria; Guojun Wang. Springer Verlag, 2019. p. 578-590 (Communications in Computer and Information Science; Vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems

AU - Prakasha, Krishna

AU - Kalkur, Rachana

AU - Acharya, Vasundhara

AU - Muniyal, Balachandra

AU - Khandelwal, Mayank

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Secure communication and Secure data transfer are one of the significant challenges in the era of Internet. With the development in information technology, there arose a need for invulnerable transfer of data. Visual Cryptography is the method in which the secrets are encoded in the form of shares which can be decrypted by overlapping the shares that are obtained. As the usage of images in the industrial process is rapidly rising, it is vital to protect the confidential image data from unauthorized access. The (2,2) Visual Cryptography scheme involves the encoding of the image to create two shares. It is later obtained through the stacking process. Further, Halftoning technique can be applied by the dithering process for the approximation of the colors in the image. It makes use of Floyd’s Steinberg Algorithm which uses the dithering process by mapping the required color from the eight color bit palette assigned. The design layout is broken down into two module. The first module is used to convert the image into a binary image, and the other module is used to pass the input image to Floyd’s Steinberg algorithm. This technique can be best suited for the application in the banking system or any other field where confidentiality is the primary concern.

AB - Secure communication and Secure data transfer are one of the significant challenges in the era of Internet. With the development in information technology, there arose a need for invulnerable transfer of data. Visual Cryptography is the method in which the secrets are encoded in the form of shares which can be decrypted by overlapping the shares that are obtained. As the usage of images in the industrial process is rapidly rising, it is vital to protect the confidential image data from unauthorized access. The (2,2) Visual Cryptography scheme involves the encoding of the image to create two shares. It is later obtained through the stacking process. Further, Halftoning technique can be applied by the dithering process for the approximation of the colors in the image. It makes use of Floyd’s Steinberg Algorithm which uses the dithering process by mapping the required color from the eight color bit palette assigned. The design layout is broken down into two module. The first module is used to convert the image into a binary image, and the other module is used to pass the input image to Floyd’s Steinberg algorithm. This technique can be best suited for the application in the banking system or any other field where confidentiality is the primary concern.

UR - http://www.scopus.com/inward/record.url?scp=85061112575&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85061112575&partnerID=8YFLogxK

U2 - 10.1007/978-981-13-5826-5_45

DO - 10.1007/978-981-13-5826-5_45

M3 - Conference contribution

SN - 9789811358258

T3 - Communications in Computer and Information Science

SP - 578

EP - 590

BT - Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers

A2 - Thampi, Sabu M.

A2 - Rawat, Danda B.

A2 - Alcaraz Calero, Jose M.

A2 - Madria, Sanjay

A2 - Wang, Guojun

PB - Springer Verlag

ER -

Prakasha K, Kalkur R, Acharya V, Muniyal B, Khandelwal M. A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems. In Thampi SM, Rawat DB, Alcaraz Calero JM, Madria S, Wang G, editors, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Springer Verlag. 2019. p. 578-590. (Communications in Computer and Information Science). https://doi.org/10.1007/978-981-13-5826-5_45