CFP last date
22 April 2024
Reseach Article

A New Tactic to Maintain Privacy and Safety of Imagery Information

by Mohammad Alamgir Hossain, Alwi Mohammad A Bamhdi, Goutam Sanyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 5
Year of Publication: 2015
Authors: Mohammad Alamgir Hossain, Alwi Mohammad A Bamhdi, Goutam Sanyal
10.5120/19310-0764

Mohammad Alamgir Hossain, Alwi Mohammad A Bamhdi, Goutam Sanyal . A New Tactic to Maintain Privacy and Safety of Imagery Information. International Journal of Computer Applications. 110, 5 ( January 2015), 6-12. DOI=10.5120/19310-0764

@article{ 10.5120/19310-0764,
author = { Mohammad Alamgir Hossain, Alwi Mohammad A Bamhdi, Goutam Sanyal },
title = { A New Tactic to Maintain Privacy and Safety of Imagery Information },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 5 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number5/19310-0764/ },
doi = { 10.5120/19310-0764 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:45:31.624273+05:30
%A Mohammad Alamgir Hossain
%A Alwi Mohammad A Bamhdi
%A Goutam Sanyal
%T A New Tactic to Maintain Privacy and Safety of Imagery Information
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 5
%P 6-12
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Privacy as well as Security is a burning issue to all the users in the field of Information Technology. With the perspective of socio, psychological, organizational, technical, economic and financial ground it is one of the most vital issues in our every day's life. Presently; security is a prime problem in domain of identification or authentication of any information that is delivered or conveyed for the reason of documentation, transaction in our life. There are various types of methodologies, algorithms, techniques available for the safeguard as well as smooth running of the system. Encryption is one among the methodologies that can solve the problem to ensure safety. A lot of encryption systems connected to images, texts, etc. have been proposed by different researchers, each one of them has its strong points as well as weak points. In this paper; a simpler method is proposed that will show a better image representation technique based on encryption. This method is simulated, investigated and executed based on permutation, value transformation and substitution. The selected and the proposed method is elaborated in a well-defined manner. Subsequently; it is assessed and equated based on the test data so that the degree of security and privacy in the encryption method is maintained.

References
  1. Wafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi, "A secure alert messaging system for safe driving", Computer Communications 46 (Elsevier 2014)
  2. Weiwei Jia, Haojin Zhu, Xiaolei Dong, and Chengxin Xiao, "Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid", IEEE SYSTEMS JOURNAL, VOL. 8, NO. 2, JUNE 2014.
  3. Sean M. Randall, Anna M. Ferrante, James H. Boyd, Jacqueline K. Bauer, James B. Semmens, "Privacy-preserving record linkage on large real world datasets", Journal of Biomedical Informatics 50 (Elsevier 2014) pp-205–212.
  4. Abraham Cher?, Michel Leeman, Florent Meurville, Antoine Rauzy, "Modeling automotive safety mechanisms: A Markovian approach", Reliability Engineering and System Safety 130 (Elsevier -2014) pp-42–49.
  5. Jun Yang, Bin Wang, Xiaochun Yang, Hongyi Zhang and Guang Xiang, "A secure K auto morphism privacy preserving approach with high data utility in social networks", SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2014; 7:1399–1411 Published online 30 September 2013, DOI: 10. 1002/sec. 840.
  6. Weiwei Jia, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, and Chengxin Xiao, "Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid", IEEE SYSTEMS JOURNAL, VOL. 8, NO. 2, JUNE 2014.
  7. Issa Khalil, Abdallah Khreishah, Muhammad Azeem, "Consolidated Identity Management System for secure mobile cloud computing", Computer Networks 65 (Elsevier -2014) 99–110.
  8. Zhiwei Wang, Guozi Sun, DanweiChen, "A new de?nition of homomorphic signature for identity management in mobile cloud computing", Journal of Computer and System Sciences 80 (Elsevier -2014) pp-546–553.
  9. Ackerman, Mark S. , Lorrie Cranor, and Joseph Reagle. 1999. Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. Proceedings of the ACM Conference in Electronic Commerce : 1-8.
  10. Spiekermann, Sarah, Jens Grossklags, and Bettina Berendt. 2001. E-privacy in 2nd Generation E- Commerce: Privacy Preferences versus Actual Behavior. Proceedings of the ACM Conference on Electronic Commerce: 38-46.
  11. Bernard, H. Russell. 2000. Social Research Methods: Qualitative and Quantitative Approaches. Newbury Park, CA: Sage.
  12. Rivest, Ron, A. Shamir, and L. Adelman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21 (2) : 120-126.
  13. Cranor, Lorrie, and Joseph Reagle. 1998. The Platform for Privacy Preferences. Communications of the ACM, 42 (2) : 48-55.
  14. Chaum, David. 1985. Security Without Identification: Transaction Systems To Make Big Brother Obsolete. Communications of the ACM, 28 : 1030-1044.
  15. Dierks, T. , and C. Allen. 1999. The Transport Layer Security Protocol. Internet RFC 2246. Diffie, W. , and M. Hellman. 1976. New Directions in Cryptography. IEEE Transactions on Information Theory, 22 (6) : 644-654.
  16. A SENGUPTA, C MAZUMDAR and MSBARIK, "e-Commerce security – A life cycle approach", Sadhana Vol. 30, Parts-2&3, April/June 2005, pp. 119–140. © Printed in India.
  17. S. W. Smith, " WebALPS: A Survey of E-Commerce Privacy and Security Applications"- Hanover, New Hampshire 03755 USA, sws@cs. dartmouth. edu.
  18. Hamid Jebur, Hamed Gheysari, Parastoo Roghanian," E-Commerce Reality and Controversial Issue ", IJFPSS, Vol 2, No. 4, pp. 74-79, Dec , 2012.
  19. MR. HARDIK NARIYA, PROF. CHIRAG GOHEL," E-COMMERCE SYSTEM: A REVIEW ON SECURITY CHALLENGES AND INDIAN PERSPECTIVE", JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMPUTER ENGINEERING, ISSN: 0975 – 6760| NOV 12 TO OCT 13 | VOLUME – 02, ISSUE – 02 Page 451-57.
  20. Suresh Chari, Parviz Kermani, Sean Smith and Leandros Tassiulas, "Security Issues in M-Commerce: A Usage Based Taxonomy", Liu and Y. Ye (Eds. ): E-Commerce Agents, LNAI 2033, pp. 264-282, 2001. Springer-Verlag, Berlin Heidelberg 2001.
  21. Himani Grewal, Shivani," A Study of Ethical and Social Issues in E-Commerce"- International Journal of Advanced Research in Computer Science and Software Engineering- Volume 2, Issue 7, July 2012 ,ISSN: 2277 128X.
  22. Raghav Gautam, Sukhwinder Singh, "Network Security Issues in e-Commerce", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014.
  23. M. Jos. Capkovic," INFORMATION SECURITY & PRIVACY NEWS"- Publication of the Information Security Committee ABA Section of Science & Technology Law, AUT UMN 2013 VOL UME 4 I SSUE 4.
  24. N. Doukas, A. Drigas, N. G. Bardis and N. V. Karadimas," Accessible Secure Information Society Applications via the Use of Optimised Cryptographic Calculations", Journal of Applied Mathematics & Bioinformatics, vol. 3, no. 4, 2013, 181-206.
  25. Peter Stavroulakis," Communications and information security: Case study military systems",Journal of Applied Mathematics & Bioinformatics, vol. 3, no. 4, 2013, 207-211 ISSN: 1792-6602 (print), 1792-6939 (online),Scienpress Ltd, 2013.
  26. Richard M. Escalante," Socio-Legal Issues Affecting the Use of Digital Signatures for Secure E-commerce Transactions: A Caribbean Perspective", 20th Sep, JIBC-2014.
  27. Shazia Yasin, Khalid Haseeb, Rashid Jalal Qureshi, "Cryptography Based E-Commerce Security: A Review", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, March 2012 ISSN (Online): 1694-0814.
  28. Ashish Wadhaval, Rugved Mehta, Ashlesha Gawade, "Mobile Commerce and Related Mobile Security Issues "International Journal of Engineering Trends and Technology (IJETT) – Vol 4 Issue 4- April 2013.
  29. Pradnya B. Rane , B. B. Meshram , "Transaction Security for E-commerce Application" International Journal of Electronics and Computer Science Engineering, SSN 2277-1956/V1N3-1720-1726.
  30. Sen-Tarng Lai," A SECURITY REQUIREMENT QUALITY MEASUREMENT MODEL FOR REDUCING ECOMMERCE SECURITY RISK", International Journal of Software Engineering & Applications (IJSEA), Vol. 5, No. 1, January 2014.
  31. K. Sakthidasan and B. V. Santhosh Krishna," A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images", International Journal of Information and Education Technology, Vol. 1, No. 2, June 2011.
  32. Godwin J. Udo, "Privacy and security concerns as major barriers for e-commerce: a survey study", Information Management & Computer Security 9/4
  33. 165-174, MCB University Press [ISSN 0968-5227].
  34. Alexandra Michota," Digital security concerns and threats facing women entrepreneurs", Michota Journal of Innovation and Entrepreneurship 2013, 2:7,Springer Open Journal.
  35. Neetu Kawatra, Vijay Kumar, "Analysis of E-Commerce Security Protocols SSL and SET", Recent Trends in Mathematics and Computing (RTMC) 2011, International Journal of Computer Applications® (IJCA).
  36. Dimitrios Poulakis," On the Cryptographic Long Term Security", Journal of Applied Mathematics & Bioinformatics, vol. 3, no. 1, 2013, 1-15.
  37. George Marinakis, "Minimum key length for cryptographic security", Journal of Applied Mathematics & Bioinformatics, vol. 3, no. 1, 2013, 181-191.
  38. Melita Charitou ,"THE ROLE OF LONG RETURNS IN SECURITY VALUATION: INTERNATIONAL EMPIRICAL EVIDENCE", The International Journal of Business and Finance Research, Volume 5, Number 3, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

IEBTA Authentication HFA Encryption Decryption permutation block-based-image image-object.