High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Hybrid Frame Work for Information Security using Blowfish and Visual Cryptography


Pranjalee Mishra , SCOPE College of Engineering; Prof. Mrs. Bharti Chourasia, SCOPE College of Engineering


Visual Cryptography, Algorithmic Program, Coding, Block Cipher, Decode Messages, Blowfish


Within the current world once entire internet is currently looming from content information to multimedia system information, one in every of the main safety considerations is that the protection of this multimedia system information. An image that covers the very preeminent preparation of the multimedia system information, its protection is extremely necessary. This may be achieved by Image coding. This paper introduces a hybrid framework for data security using blowfish and visual cryptography. In this paper encryption takes place by completely different steps foremost the information is reborn into image then and every pixel of the image is reinvigorated to its equivalent eight binary range, and in this eight bit range, the amount of bits, that area unit adequate the length of the amount generated from the password, area unit turned and reversed ,then further more visual cryptography is applied that uses pictures distributed as shares specified once the shares area unit superimposed a hidden image disclosed and ultimately the blowfish algorithmic program is applied for coding of information, Blowfish may be a symmetric coding algorithmic program, that means that it uses a similar secret key to each cypher and decode messages, Blowfish is additionally a block cipher, that means that it divides a message up into mounted length blocks throughout coding and secret writing the block length for Blowfish is sixty four bits, messages that are not a multiple of eight bytes in size should be muffled. The projected technique is tested on completely different information files and therefore the results were much more than satisfactory.

Other Details

Paper ID: IJSRDV5I20472
Published in: Volume : 5, Issue : 2
Publication Date: 01/05/2017
Page(s): 443-447

Article Preview

Download Article