CFP last date
22 April 2024
Reseach Article

Image Encryption using Adaptive Pixel Masking under Various Noise Attacks

by Garima Pal, Vijay Kumar Verma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 2
Year of Publication: 2017
Authors: Garima Pal, Vijay Kumar Verma
10.5120/ijca2017913587

Garima Pal, Vijay Kumar Verma . Image Encryption using Adaptive Pixel Masking under Various Noise Attacks. International Journal of Computer Applications. 164, 2 ( Apr 2017), 12-16. DOI=10.5120/ijca2017913587

@article{ 10.5120/ijca2017913587,
author = { Garima Pal, Vijay Kumar Verma },
title = { Image Encryption using Adaptive Pixel Masking under Various Noise Attacks },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 2 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number2/27455-2017913587/ },
doi = { 10.5120/ijca2017913587 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:09.863556+05:30
%A Garima Pal
%A Vijay Kumar Verma
%T Image Encryption using Adaptive Pixel Masking under Various Noise Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 2
%P 12-16
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptosystems have always had tremendous applications in the fields of data security. With ever growing applications of digital images, encryption of images has emerged as a highly sought after area of research. In this present paper, a novel adaptive pixel masking scheme has been introduced for image encryption. Since images undergo degradations while transmission as well as storage, an image degradation model has been designed and simulated for common types of noise and blurring effects. Further a technique comprising of linear filtering has been proposed. It has been shown that the proposed technique achieves improved results in terms of Peak Signal to Noise Ratio and Mean Square Error as compared to previous works. A detailed description of the aforesaid aspects ensues.

References
  1. Nidaa AbdulMohsin Abbas, “Image encryption based on Independent Component Analysis and Arnold’s Cat Map”,Elesvier ,2015.Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  2. Reversibility improved data hiding in encrypted images, by Weiming Zhang, Kede Ma, Yu Elsevier 2014.Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  3. Maniccam S.S., Bourbakis N.G., “Lossless image compression and encryption using SCAN”, Pattern Recognition 34 (2001) 1229-1245 Springer 2014Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  4. Acharya B, Patra S. K., Panda G., “A Novel Cryptosystem Using Matrix Transformation”, Proceedings of SPIT-IEEE Colloquium and International Conference, Mumbai, India, Vol. 4, 92
  5. Gautam A, Panwar M, Gupta P. R., “A New Image Encryption Approach Using Block Based Transformation Algorithm”, International Journal Of Advanced Engineering Sciences And Technologies, Vol No. 8, Issue No. 1, 090 – 096 2013
  6. C. H. Kim, “Improved Differential Fault Analysis on AES Key Schedule”, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 1, pp. 41-50, 2012.
  7. Zhang X, Feng G, Ren Y, and Qian Z. , “Scalable Coding of Encrypted Images”, IEEE Transactions On Image Processing, Vol. 21, No.6, June 2012 Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender
Index Terms

Computer Science
Information Sciences

Keywords

Digital Image Processing (DIP) Image De-noising Peak Signal to Noise Ratio (PSNR) Mean Square Error Adaptive Pixel Masking.