A Survey on Image Encryption and Decryption using Blowfish & Watermarking

Main Article Content

Preeti Gaur, Neeraj Manglani


Internet means International Network. In the present era, to send and receive information, the internet is the main media. This information may be text, audio, graphics and video etc. There are many advantages of internet. Internet provides quickest data delivery services, security of data is major concern for all internet users. There is always a sense of insecurity amongst internet user after sending data or image until he gets an acknowledgment from the opposite side informing that they have received the data safely, that too without any manipulation in its content. The confidentiality, non-repudiation, validation, reliability, of the information (data or image) should be checked properly otherwise data manipulation can have big problem. We can get these objectives with cryptography which is simply the science of securing sensitive and confidential information as it is stored on media or transmitted through communication network paths. Here, images are considered with an aim to secure them during its storage and transmission. Blowfish Algorithm, a type of symmetric key cryptography is the best solution for this. The two processes, encryption and decryption together form the cryptographic process. For ensuring security, the images are encrypted by the sender before transmitting them and are decrypted by the receiver after receiving them so that only the sender and the intended person can see the content in the image. The blowfish algorithm is safe against unauthorized attack and runs faster than the popular accessible algorithms. For double protection, after the blowfish process, the encrypted image tends to go through a water marking process which is used to hide a secret or personal message to protect a products copyright or to demonstrate data integrity Watermarking is the process of embedding new data into image, audio or video. We perform watermarking on different types of images say JPEG, BMP etc. The anticipated work is designed and implemented using MATLAB.
DOI: 10.17762/ijritcc2321-8169.1505167

Article Details

How to Cite
, P. G. N. M. “A Survey on Image Encryption and Decryption Using Blowfish &Amp; Watermarking”. International Journal on Recent and Innovation Trends in Computing and Communication, vol. 3, no. 5, May 2015, pp. 3285-8, doi:10.17762/ijritcc.v3i5.4437.