After row encryption, column nee d to be encrypted by again generating random numbers using LFSR to reorder each pixels in the column of the image. In the encryption stage the LFSR will generate random numbers to reorder positions of each pixels in the row of the image. The encrypted image can be decoded in the decryption stage. In this method two step encryption is provided to give more security to the data. In order to protect data from unauthorized access a new concept is introduced and this is based on linear feedback shift register method. XOR execution and then decrypt the column encrypted image andįinally decrypting row encrypted image to reconstruct the originalĮncrypting data is a way to protect the data or to prevent the unauthorized access of data by other s and these data can be text, image audio, video or anything. Then we use XOR operation to shuffle all pixels to get Random numbers using LFSR to reorder each pixels in the column After rowĮncryption, column need to be encrypted by again generating Reorder positions of each pixels in the row of the image. In theĮncryption stage the LFSR will generate random numbers to TheĮncrypted image can be decoded in the decryption stage. In this method two stepĮncryption is provided to give more security to the data. On linear feedback shift register method. Unauthorized access a new concept is introduced and this is based The unauthorized access of data by others and these data can be Encrypting data is a way to protect the data or to prevent
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |