Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Hybrid Cryptographic Encryption Technique for Securing Surveillance Digital Images in Mobile Urban Situation Awareness Systems

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 119 - Number 7
Year of Publication: 2015
Authors:
Quist-aphetsi Kester
Laurent Nana
Anca Christine Pascu
Sophie Gire
Jojo M. Eghan
Nii Narku Quaynor
10.5120/21079-3756

Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M Eghan and Nii Narku Quaynor. Article: A Hybrid Cryptographic Encryption Technique for Securing Surveillance Digital Images in Mobile Urban Situation Awareness Systems. International Journal of Computer Applications 119(7):16-22, June 2015. Full text available. BibTeX

@article{key:article,
	author = {Quist-aphetsi Kester and Laurent Nana and Anca Christine Pascu and Sophie Gire and Jojo M. Eghan and Nii Narku Quaynor},
	title = {Article: A Hybrid Cryptographic Encryption Technique for Securing Surveillance Digital Images in Mobile Urban Situation Awareness Systems},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {119},
	number = {7},
	pages = {16-22},
	month = {June},
	note = {Full text available}
}

Abstract

With the increase in structural complexities in modern cities, many operations, be they military, police, fire service, intelligence, rescue, or other field operations, require localization services and online situation awareness to make them effective. The digital data collected from such systems are sensitive hence security concerns regarding the transmission of such digital data across secured and unsecured communication channels needs to be secured. In this paper, we proposed a hybrid cryptographic encryption technique for securing Surveillance digital images data in Mobile Urban Situation Awareness System using RSA public-key encryption cryptosystem and RGB pixel displacement. The implementation was done using MATLAB simulation software.

References

  • Balfour, R. E. ; Donnelly, B. P. , "The what, why and how of achieving urban telepresence," Systems, Applications and Technology Conference (LISAT), 2013 IEEE Long Island , vol. , no. , pp. 1,6, 3-3 May 2013doi: 10. 1109/LISAT. 2013. 6578234
  • Yun-Ju Huang, Feng-Hao Liu, and Bo-Yin Yang. 2012. Public-Key cryptography from new multivariate quadratic assumptions. In Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography (PKC'12), Marc Fischlin, Johannes Buchmann, and Mark Manulis (Eds. ). Springer-Verlag, Berlin, Heidelberg, 190-205. DOI=10. 1007/978-3-642-30057-8_12 http://dx. doi. org/10. 1007/978-3-642-30057-8_12
  • Benny, Applebaum, Boaz Barak, and Avi Wigderson. 2010. Public-key cryptography from different assumptions. In Proceedings of the forty-second ACM symposium on Theory of computing (STOC '10). ACM, New York, NY, USA, 171-180. DOI=10. 1145/1806689. 1806715 http://doi. acm. org/10. 1145/1806689. 1806715
  • Ray, A. Perlner and David A. Cooper. 2009. Quantum resistant public key cryptography: a survey. In Proceedings of the 8th Symposium on Identity and Trust on the Internet (IDtrust '09), Kent Seamons, Neal McBurnett, and Tim Polk (Eds. ). ACM, New York, NY, USA, 85-93. DOI=10. 1145/1527017. 1527028 http://doi. acm. org/10. 1145/1527017. 1527028
  • Musheer Ahmad and Tanvir Ahmad. 2014. Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys. Int. J. Commun. Netw. Distrib. Syst. 12, 1 (November 2014), 113-128. DOI=10. 1504/IJCNDS. 2014. 057991http://dx. doi. org/ 10. 15 04/I J CNDS. 2014. 057991
  • Jonathan Bishop. 2014. Representations of 'trolls' in mass media communication: a review of media-texts and moral panics relating to 'internet trolling'. Int. J. Web Based Communities 10, 1 (December 2014), 7-24. DOI=10. 1504/IJWBC. 2014. 058384 http://dx. doi. org/ 10. 1504/IJWBC. 2014. 058384
  • Sajal, K. Das, Krishna Kant, and Nan Zhang. 2012. Handbook on Securing Cyber-Physical Critical Infrastructure (1st ed. ). Morgan Kaufmann Publishers Inc. , San Francisco, CA, USA.
  • Bjorkbom, M. ; Timonen, J. ; Yigitler, H. ; Kaltiokallio, O. ; Garcia, J. M. V. ; Myrsky, M. ; Saarinen, J. ; Korkalainen, M. ; Cuhac, C. ; Jantti, R. ; Virrankoski, R. ; Vankka, J. ; Koivo, H. N. , "Localization Services for Online Common Operational Picture and Situation Awareness," Access, IEEE , vol. 1, no. , pp. 742,757, 2013 doi:10. 1109/ACCESS. 2013. 2287302
  • Saeed, Q. ; Basir, T. ; Ul Haq, S. ; Zia, N. ; Paracha, M. A. , "Mathematical Hard Problems in Modern Public-Key Cryptosystem," Emerging Technologies, 2006. ICET '06. International Conference on , vol. , no. , pp. 456,460, 13-14 Nov. 2006 doi: 10. 1109/ICET. 2006 . 335986
  • He, Jun; Jun Zheng; Zhi-bin Li; Hai-feng Qian, "Color Image Cryptography Using Multiple One-Dimensional Chaotic Maps and OCML," Information Engineering and Electronic Commerce, 2009. IEEC '09. International Symposium on , vol. , no. , pp. 85,89, 16-17 May 2009 doi: 10. 1109/IEEC. 2009. 23
  • Ming, Sun Fu; Au, O. C. , "Joint visual cryptography and watermarking," Multimedia and Expo, 2004. ICME '04. 2004 IEEE International Conference on , vol. 2, no. , pp. 975,978 Vol. 2, 30-30 June 2004 doi: 10. 1109/ICME. 2004. 1394365
  • ShunDa Lin, "Image transmission and cryptography on the basis of Mobius transform," Image and Signal Processing (CISP), 2012 5th International Congress on , vol. , no. , pp. 258,261, 16-18 Oct. 2012 doi: 10. 1109/CISP. 2012. 6469901
  • Singh, T. R. ; Singh, K. M. ; Roy, S. , "Robust video watermarking scheme based on visual cryptography," Information and Communication Technologies (WICT), 2012 World Congress on , vol. , no. , pp. 872,877, Oct. 30 2012-Nov. 2 2012 doi: 10. 1109/WICT. 2012. 6409198
  • Kester, Q. A. , Nana, L. , Pascu, A. C. , Gire, S. , Eghan, J. M. , & Quaynnor, N. N. (2014). A hybrid encryption technique for securing biometric image data based on feistel network and RGB pixel displacement. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 530-539). Springer Berlin Heidelberg.
  • Dongming, Chen, "A Feasible Chaotic Encryption Scheme for Image," Chaos-Fractals Theories and Applications, 2009. IWCFTA '09. International Workshop on , vol. , no. , pp. 172,176, 6-8 Nov. 2009 doi: 10. 1109/IWCFTA. 2009. 43
  • Prema, G. ; Natarajan, S. , "An enhanced security algorithm for wireless application using RSA and genetic approach," Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on , vol. , no. , pp. 1,5, 4-6 July 2013 doi: 10. 1109/ICCCNT. 2013. 6726679
  • Bansod, S. P. ; Mane, V. M. ; Ragha, L. R. , "Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity," Communication, Information & Computing Technology (ICCICT), 2012 International Conference on , vol. , no. , pp. 1,6, 19-20 Oct. 2012 doi: 10. 1109/ICCICT. 2012. 6398199
  • Kester, Q. A. , & Koumadi, K. M. (2012, October). Cryptographie technique for image encryption based on the RGB pixel displacement. In Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference on (pp. 74-77). IEEE.
  • Bruen, Aiden A. & Forcinito, Mario A. (2011). Cryp-tography, Information Theory, and Error-Correction: A Handbook for the 21st Century. John Wiley & Sons. p. 21. ISBN 978-1-118-03138-4. http://books. google. com/books?id=fd2LtVgFzoMC& pg=PA21.
  • R. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, Vol. 21 (2), pp. 120-126. 1978.
  • SQUAD X CORE TECHNOLOGIES SEEKS TO BRING TECHNOLOGICAL ADVANCES TO THE INFANTRY(2015) New program pursues integrated systems to enhance infantry squad adaptability and flexibility in complex environments SQUAD http://www. darpa. mil/NewsEvents/Releases/2015/02/09a. aspx
  • Disarmament and International Security Committee. (2014) The Use of Drones and Autonomous Robots. Bucharest international model united nation congress.