CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Hybrid Cryptographic Encryption Technique for Securing Surveillance Digital Images in Mobile Urban Situation Awareness Systems

by Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 7
Year of Publication: 2015
Authors: Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor
10.5120/21079-3756

Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor . A Hybrid Cryptographic Encryption Technique for Securing Surveillance Digital Images in Mobile Urban Situation Awareness Systems. International Journal of Computer Applications. 119, 7 ( June 2015), 16-22. DOI=10.5120/21079-3756

@article{ 10.5120/21079-3756,
author = { Quist-aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor },
title = { A Hybrid Cryptographic Encryption Technique for Securing Surveillance Digital Images in Mobile Urban Situation Awareness Systems },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 7 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 16-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number7/21079-3756/ },
doi = { 10.5120/21079-3756 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:03:25.132569+05:30
%A Quist-aphetsi Kester
%A Laurent Nana
%A Anca Christine Pascu
%A Sophie Gire
%A Jojo M. Eghan
%A Nii Narku Quaynor
%T A Hybrid Cryptographic Encryption Technique for Securing Surveillance Digital Images in Mobile Urban Situation Awareness Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 7
%P 16-22
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the increase in structural complexities in modern cities, many operations, be they military, police, fire service, intelligence, rescue, or other field operations, require localization services and online situation awareness to make them effective. The digital data collected from such systems are sensitive hence security concerns regarding the transmission of such digital data across secured and unsecured communication channels needs to be secured. In this paper, we proposed a hybrid cryptographic encryption technique for securing Surveillance digital images data in Mobile Urban Situation Awareness System using RSA public-key encryption cryptosystem and RGB pixel displacement. The implementation was done using MATLAB simulation software.

References
  1. Balfour, R. E. ; Donnelly, B. P. , "The what, why and how of achieving urban telepresence," Systems, Applications and Technology Conference (LISAT), 2013 IEEE Long Island , vol. , no. , pp. 1,6, 3-3 May 2013doi: 10. 1109/LISAT. 2013. 6578234
  2. Yun-Ju Huang, Feng-Hao Liu, and Bo-Yin Yang. 2012. Public-Key cryptography from new multivariate quadratic assumptions. In Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography (PKC'12), Marc Fischlin, Johannes Buchmann, and Mark Manulis (Eds. ). Springer-Verlag, Berlin, Heidelberg, 190-205. DOI=10. 1007/978-3-642-30057-8_12 http://dx. doi. org/10. 1007/978-3-642-30057-8_12
  3. Benny, Applebaum, Boaz Barak, and Avi Wigderson. 2010. Public-key cryptography from different assumptions. In Proceedings of the forty-second ACM symposium on Theory of computing (STOC '10). ACM, New York, NY, USA, 171-180. DOI=10. 1145/1806689. 1806715 http://doi. acm. org/10. 1145/1806689. 1806715
  4. Ray, A. Perlner and David A. Cooper. 2009. Quantum resistant public key cryptography: a survey. In Proceedings of the 8th Symposium on Identity and Trust on the Internet (IDtrust '09), Kent Seamons, Neal McBurnett, and Tim Polk (Eds. ). ACM, New York, NY, USA, 85-93. DOI=10. 1145/1527017. 1527028 http://doi. acm. org/10. 1145/1527017. 1527028
  5. Musheer Ahmad and Tanvir Ahmad. 2014. Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys. Int. J. Commun. Netw. Distrib. Syst. 12, 1 (November 2014), 113-128. DOI=10. 1504/IJCNDS. 2014. 057991http://dx. doi. org/ 10. 15 04/I J CNDS. 2014. 057991
  6. Jonathan Bishop. 2014. Representations of 'trolls' in mass media communication: a review of media-texts and moral panics relating to 'internet trolling'. Int. J. Web Based Communities 10, 1 (December 2014), 7-24. DOI=10. 1504/IJWBC. 2014. 058384 http://dx. doi. org/ 10. 1504/IJWBC. 2014. 058384
  7. Sajal, K. Das, Krishna Kant, and Nan Zhang. 2012. Handbook on Securing Cyber-Physical Critical Infrastructure (1st ed. ). Morgan Kaufmann Publishers Inc. , San Francisco, CA, USA.
  8. Bjorkbom, M. ; Timonen, J. ; Yigitler, H. ; Kaltiokallio, O. ; Garcia, J. M. V. ; Myrsky, M. ; Saarinen, J. ; Korkalainen, M. ; Cuhac, C. ; Jantti, R. ; Virrankoski, R. ; Vankka, J. ; Koivo, H. N. , "Localization Services for Online Common Operational Picture and Situation Awareness," Access, IEEE , vol. 1, no. , pp. 742,757, 2013 doi:10. 1109/ACCESS. 2013. 2287302
  9. Saeed, Q. ; Basir, T. ; Ul Haq, S. ; Zia, N. ; Paracha, M. A. , "Mathematical Hard Problems in Modern Public-Key Cryptosystem," Emerging Technologies, 2006. ICET '06. International Conference on , vol. , no. , pp. 456,460, 13-14 Nov. 2006 doi: 10. 1109/ICET. 2006 . 335986
  10. He, Jun; Jun Zheng; Zhi-bin Li; Hai-feng Qian, "Color Image Cryptography Using Multiple One-Dimensional Chaotic Maps and OCML," Information Engineering and Electronic Commerce, 2009. IEEC '09. International Symposium on , vol. , no. , pp. 85,89, 16-17 May 2009 doi: 10. 1109/IEEC. 2009. 23
  11. Ming, Sun Fu; Au, O. C. , "Joint visual cryptography and watermarking," Multimedia and Expo, 2004. ICME '04. 2004 IEEE International Conference on , vol. 2, no. , pp. 975,978 Vol. 2, 30-30 June 2004 doi: 10. 1109/ICME. 2004. 1394365
  12. ShunDa Lin, "Image transmission and cryptography on the basis of Mobius transform," Image and Signal Processing (CISP), 2012 5th International Congress on , vol. , no. , pp. 258,261, 16-18 Oct. 2012 doi: 10. 1109/CISP. 2012. 6469901
  13. Singh, T. R. ; Singh, K. M. ; Roy, S. , "Robust video watermarking scheme based on visual cryptography," Information and Communication Technologies (WICT), 2012 World Congress on , vol. , no. , pp. 872,877, Oct. 30 2012-Nov. 2 2012 doi: 10. 1109/WICT. 2012. 6409198
  14. Kester, Q. A. , Nana, L. , Pascu, A. C. , Gire, S. , Eghan, J. M. , & Quaynnor, N. N. (2014). A hybrid encryption technique for securing biometric image data based on feistel network and RGB pixel displacement. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 530-539). Springer Berlin Heidelberg.
  15. Dongming, Chen, "A Feasible Chaotic Encryption Scheme for Image," Chaos-Fractals Theories and Applications, 2009. IWCFTA '09. International Workshop on , vol. , no. , pp. 172,176, 6-8 Nov. 2009 doi: 10. 1109/IWCFTA. 2009. 43
  16. Prema, G. ; Natarajan, S. , "An enhanced security algorithm for wireless application using RSA and genetic approach," Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on , vol. , no. , pp. 1,5, 4-6 July 2013 doi: 10. 1109/ICCCNT. 2013. 6726679
  17. Bansod, S. P. ; Mane, V. M. ; Ragha, L. R. , "Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity," Communication, Information & Computing Technology (ICCICT), 2012 International Conference on , vol. , no. , pp. 1,6, 19-20 Oct. 2012 doi: 10. 1109/ICCICT. 2012. 6398199
  18. Kester, Q. A. , & Koumadi, K. M. (2012, October). Cryptographie technique for image encryption based on the RGB pixel displacement. In Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference on (pp. 74-77). IEEE.
  19. Bruen, Aiden A. & Forcinito, Mario A. (2011). Cryp-tography, Information Theory, and Error-Correction: A Handbook for the 21st Century. John Wiley & Sons. p. 21. ISBN 978-1-118-03138-4. http://books. google. com/books?id=fd2LtVgFzoMC& pg=PA21.
  20. R. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, Vol. 21 (2), pp. 120-126. 1978.
  21. SQUAD X CORE TECHNOLOGIES SEEKS TO BRING TECHNOLOGICAL ADVANCES TO THE INFANTRY(2015) New program pursues integrated systems to enhance infantry squad adaptability and flexibility in complex environments SQUAD http://www. darpa. mil/NewsEvents/Releases/2015/02/09a. aspx
  22. Disarmament and International Security Committee. (2014) The Use of Drones and Autonomous Robots. Bucharest international model united nation congress.
Index Terms

Computer Science
Information Sciences

Keywords

Digital images RSA cryptography pixel displacement