Visible to the public Image Encryption and Decryption using Enigma Algorithm

TitleImage Encryption and Decryption using Enigma Algorithm
Publication TypeConference Paper
Year of Publication2019
AuthorsAbir, Md. Towsif, Rahman, Lamiya, Miftah, Samit Shahnawaz, Sarker, Sudipta, Al Imran, Md. Ibrahim, Shafiqul Islam, Md.
Conference Name2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT)
KeywordsAlgorithm, blue intensity, Breadboard, composability, computationally efficient procedure, cryptography, Cyber-physical systems, decryption, efficient encryption, encrypting decrypting images, Encryption, enigma, enigma algorithm, enigma machine, green intensity, highly advanced technologies, image colour analysis, image encryption, image encryptions, image security, Mathematical model, military communication, original RGB value, pixel, pubcrawl, red intensity, resilience, Resiliency, Rotors, secured image processing, secured procedure
Abstract

The main objective of this paper is to present a more secured and computationally efficient procedure of encrypting and decrypting images using the enigma algorithm in comparison to the existing methods. Available literature on image encryptions and descriptions are not highly secured in every case.To achieve more secured image processing for highly advanced technologies, a proposed algorithm can be the process used in enigma machine for image encryption and decryption. Enigma machine is piece of spook hardware that was used frequently during the World War II by the Germans. This paper describes the detailed algorithm along with proper demonstration of several essential components present in an enigma machine that is required for image security. Each pixel in a colorful picture can be represented by RGB (Red, Green, Blue) value. The range of RGB values is 0 to 255 that states the red, green and blue intensity of a particular picture.These RGB values are accessed one by one and changed into another by various steps and hence it is not possible to track the original RGB value. In order to retrieve the original image, the receiver needs to know the setting of the enigma. To compare the decrypted image with the original one,these two images are subtracted and their results are also discussed in this paper.

DOI10.1109/ICECCT.2019.8868988
Citation Keyabir_image_2019