CFP last date
20 May 2024
Reseach Article

Image Encryption using Key Matrix Generation and Lossless Compression

by Natasha D’costa, Anusha Pai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 10
Year of Publication: 2013
Authors: Natasha D’costa, Anusha Pai
10.5120/13896-1847

Natasha D’costa, Anusha Pai . Image Encryption using Key Matrix Generation and Lossless Compression. International Journal of Computer Applications. 80, 10 ( October 2013), 19-24. DOI=10.5120/13896-1847

@article{ 10.5120/13896-1847,
author = { Natasha D’costa, Anusha Pai },
title = { Image Encryption using Key Matrix Generation and Lossless Compression },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 10 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number10/13896-1847/ },
doi = { 10.5120/13896-1847 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:11.015630+05:30
%A Natasha D’costa
%A Anusha Pai
%T Image Encryption using Key Matrix Generation and Lossless Compression
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 10
%P 19-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most of the existing encryption algorithms are best suited for textual data and cannot directly be applied on images since image data have special features such as bulk capacity, high redundancy and high correlation among pixels that imposes special requirements on the encryption technique used. Therefore, image security has its own special requirements that lead to different thoughts to protect digital data. In this paper, the proposed system would overcome the problem of security and storage by encrypting and compressing the image. The image would be encrypted using a key matrix and then compressed using the proposed algorithms for encryption and compression on the sender side. Similarly on the receiver side the received image would be decompressed and decrypted using the same key. The proposed encryption algorithm encrypts the pixel values by exoring these values with the key generated by the key generation algorithm and then compresses these encrypted pixel values using a specific encoding scheme. This system can be used in any application where image needs to be sent over an insecure channel.

References
  1. Yicong Z. , Panetta K, Agaian S, Senior Member, "Image Encryption Using Binary Key- images" ,Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009
  2. Maniccam S. S. , Bourbakis N. G. , "Lossless image compression and encryption using SCAN", Pattern Recognition 34 (2001) 1229-1245
  3. Acharya B, Patra S. K. , Panda G. , "A Novel Cryptosystem Using Matrix Transformation", Proceedings of SPIT-IEEE Colloquium and International Conference, Mumbai, India, Vol. 4, 92
  4. Liu W, Zeng W, Dong L, and Yao Q, "Efficient Compression Of Encrypted Grayscale Images", IEEE Transactions on Image Processing, Vol. 19, No. 4, April 2010
  5. Gautam A, Panwar M, Gupta P. R. , "A New Image Encryption Approach Using Block Based Transformation Algorithm", International Journal Of Advanced Engineering Sciences And Technologies, Vol No. 8, Issue No. 1, 090 – 096
  6. Johnson M, Ishwar P, Prabhakaran V, Schonberg D, and Ramchandran K, "On Compressing Encrypted Data", IEEE Transactions On Signal Processing, Vol. 52, No. 10, October 2004
  7. Zhang X, "Lossy Compression and Iterative Reconstruction for Encrypted Image", IEEE Transactions On Information Forensics And Security, Vol. 6, No. 1, March 2011
  8. Zhang X, Feng G, Ren Y, and Qian Z. , "Scalable Coding of Encrypted Images", IEEE Transactions On Image Processing, Vol. 21, No. 6, June 2012
  9. Guo J M and Le T N, "Secret Communication Using JPEG Double Compression", IEEE Signal Processing Letters, Vol. 17, No. 10, October 2010
  10. Sudharsanan S, "Shared Key Encryption of JPEG Color Images", IEEE Transactions On Consumer Electronics, Vol. 51, No. 4, November 2005
  11. Reddy P V, Sharma K. V, Mallesham P. , Radhadevi P. , "Secure Image Transmission Through Unreliable Channels", International Journal on Computer Science and Engineering, Vol. 02, No. 06, 2010, 2053-2058
  12. Kushwaha J, Roy B. , "Secure Image Data by Double encryption", International Journal of Computer Applications (0975 – 8887), Volume 5– No. 10, August 2010
  13. Rathod H. , Sisodia M. S. , Sharma S. K. , "Design and Implementation of Image Encryption Algorithm by using Block Based Symmetric Transformation Algorithm (Hyper Image Encryption Algorithm)",International Journal of Computer Technology and Electronics Engineering (IJCTEE),Volume 1, Issue 3
  14. Stallings W, Cryptography and Network Security: Principles andPractice, 3rded. Upper Saddle River, NJ: Prentice-Hall, 2003.
  15. Pratt W. K. , Burge M. J. , Digital Image Processing, 4th edition , A John Wiley & Sons, Inc. , Publication.
Index Terms

Computer Science
Information Sciences

Keywords

Image Encryption Compression Decryption Decompression Security Analysis