RC4 Technique in Visual Cryptography RGB Image Encryption

International Journal of Computer Science and Engineering
© 2016 by SSRG - IJCSE Journal
Volume 3 Issue 7
Year of Publication : 2016
Authors : Andysah Putera Utama Siahaan

How to Cite?

Andysah Putera Utama Siahaan, "RC4 Technique in Visual Cryptography RGB Image Encryption," SSRG International Journal of Computer Science and Engineering , vol. 3,  no. 7, pp. 1-6, 2016. Crossref, https://doi.org/10.14445/23488387/IJCSE-V3I7P101


 In this study, we are doing a cryptography scheme which can modify the visualization of pictures. The image protection is very critical. It does not alter the value of the header and the metadata. We are just trying to modify the color intensities. Every image consists of three color layers. There are red, green and blue (RGB). Each layer has numbers which represent the intensity. RC4 is used to change the color intensity in every layer. The encryption process it to manipulate the integer number and produce the encrypted value. We determine how many layers is going to be encrypted. The fuzziness of the encrypted image depends on how many layer are included. The visualization will be unrecognized after the encryption. It changes to a noisy picture. This method makes the image content secure and undetected.


Cryptography, Image Encryption, Steganography.


[1] K. D. Patel dan S. Belani, “Image Encryption Using Different Techinques,” International Journal of Emerging Technology and Advanced Engineering, vol. 1, no. 1, pp. 30-34, 2011.
[2] P. V. Chavan, M. Atique dan L. Malik, “Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares,” International Journal of Network Security, vol. 6, no. 1, pp. 91-102, 2014.
[3] A. Shamir, “How to share a secret,” Communications of ACM, vol. 22, no. 11, pp. 612-613, 1979.
[4] A. P. U. Siahaan, “Vernam Conjugated Manipulation of Bit- Plane Complexity Segmentation,” International Conference of Computer, Environment, Social Science, Engineering & Technology, Medan, 2016.
[5] A. P. U. Siahaan, “Blum Blum Shub in Generating Key in RC4,” KNSI, Batam, 2016.
[6] A. P. U. Siahaan, “BPCS Steganography Noise-For Region Security Improvisation,” The International Journal of Science & Technoledge, 2016.