Abstract

With the growth in the demand for data exchange between any electronic system, the need for security of the information exchanged has become a necessity. The protection of the information related to the user from getting exposed to unauthorized person becomes a challenging issue. Hence, there is a requirement to encrypt the private user data to maintain the privacy. The paper focuses on maintaining the privacy of the sender information which is used for authentication of the image transmitted in the communication system. By embedding the information of the sender in the encrypted form, privacy for the sender information is obtained. The encryption of the sender data can be performed by using various encryption algorithms. In this work, encryption of the information of the person sending the image which is taken in the form of text file of varying size is performed using blowfish encryption algorithm which is a symmetric key block cipher. The length of the key used in blowfish for encryption and decryption ranges from 32 to 448 bits and the block size used is 64 bits. The structure of the algorithm is fiestal network. The work is implemented using MATLAB.

Original languageEnglish
Title of host publication2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2019 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728137353
DOIs
Publication statusPublished - 08-2019
Event3rd IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2019 - Manipal, India
Duration: 11-08-201912-08-2019

Publication series

Name2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2019 - Proceedings

Conference

Conference3rd IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2019
Country/TerritoryIndia
CityManipal
Period11-08-1912-08-19

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Decision Sciences (miscellaneous)
  • Information Systems and Management
  • Electrical and Electronic Engineering
  • Computational Mathematics
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Privacy Preservation Mechanism For The Data Used In Image Authentication'. Together they form a unique fingerprint.

Cite this