CFP last date
20 June 2024
Reseach Article

Multimedia Content Security using Image Encryption

Published on September 2014 by Reshu Choudhary, Arun Jb
National Conference on Advances in Technology and Applied Sciences
Foundation of Computer Science USA
NCATAS - Number 1
September 2014
Authors: Reshu Choudhary, Arun Jb
59408e5a-9060-4fe0-b25d-b1fd879c3f51

Reshu Choudhary, Arun Jb . Multimedia Content Security using Image Encryption. National Conference on Advances in Technology and Applied Sciences. NCATAS, 1 (September 2014), 30-33.

@article{
author = { Reshu Choudhary, Arun Jb },
title = { Multimedia Content Security using Image Encryption },
journal = { National Conference on Advances in Technology and Applied Sciences },
issue_date = { September 2014 },
volume = { NCATAS },
number = { 1 },
month = { September },
year = { 2014 },
issn = 0975-8887,
pages = { 30-33 },
numpages = 4,
url = { /proceedings/ncatas/number1/17946-1608/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Technology and Applied Sciences
%A Reshu Choudhary
%A Arun Jb
%T Multimedia Content Security using Image Encryption
%J National Conference on Advances in Technology and Applied Sciences
%@ 0975-8887
%V NCATAS
%N 1
%P 30-33
%D 2014
%I International Journal of Computer Applications
Abstract

Today web is going towards the multimedia data in which image covers the highest percentage of it. But with the ever-increasing growth of multimedia applications, security is an important aspect in communication and storage of images, and encryption is the way to ensure security. Image encryption techniques try to convert original image to another image that is hard to understand and to keeps the image confidential between users. Valuable multimedia content such as digital images, however, is vulnerable to unauthorized access while in storage and during transmission over a network. Visual cryptography is a method for protecting image based secrets that has a computation-free decoding process. In this proposed technique a color images are used, and by applying proposed algorithm image decryption is successfully achieved with satisfactory results. Encrypted Image quality measurement is done with PSNR calculation. MATLAB is used for applying algorithm, simulated results shows that secure image transmission can achieved without revealing information about image content.

References
  1. D. Song, D. Wagner and A. Perrig, "Practical Techniques for Searches in Encrypted Data", IEEE Symp. on Research in Security and Privacy, pp. 44-55, 2000.
  2. D. Boneh, G. Crescenzo, R. Ostrovsky and G. Persiano,"Public-key Encryption with Keyword Search", Proc. of Eurocrypt, pp. 506-522, 2004.
  3. A. Swaminathan, Y. Mao, G-M. Su, H. Gou, A. L. Varna, S. He, M. Wu and D. W. Oard, "Confidentiality Preserving Rankordered Search", Proc. of the ACM Workshop on Storage, Security, and Survivability, pp. 7-12, Oct. 2007.
  4. R. Datta, D. Joshi, J. Li and J. Z. Wang, "Image Retrieval: Ideas, Influences, and Trends of the new age", ACM Computing Surveys, 2008.
  5. W. Lu, A. Swaminathan, A. L. Varna and M. Wu, "Enabling Search over Encrypted Multimedia Databases", SPIE Media Forensics and Security XI, Jan. 2009.
  6. Ji Won Yoon and Hyoungshick Kim, "An Image Encryption Scheme with a Pseudorandom Permutation Based on Chaotic Maps", Communication in Nonlinear Science and Numerical Simulation, Vol. 15, No. 12, pp. 3998-4006, 2010.
  7. Ismail Amr Ismail, Mohammed Amin and Hossam Diab, "A Digital Image Encryption Algorithm based a Composition of two Chaotic Logistic Map", International Journal of Network Security, Vol. 11, No. 1, pp. 1-10, 2010.
  8. Alireza Jolfaei and Abdolrasoul Mirghadri, "Image Encryption using Chaos and Block Cipher", Computer and Information Science, Vol. 4, No. 1, pp. 172-185, 2011.
  9. M. Musa, E. Schaefer and S. Wedig,"A Simplified AES Algorithm and its Linear and Differential Cryptanalysis", Cryptologia, Vol. 27, pp. 148-177, 2003.
  10. Chinmaya Kumar Nayak, Anuja Kumar Acharya and Satyabrata Das, "Image Encryption using an Enhanced Block based Transformation Algorithm", International Journal of Research and Review in Computer Science, Vol. 2, No. 2, pp. 275-279, 2011.
  11. G. A. Sathishkumar and K. Bhoopathy Bagan, "A Novel Image Encryption Algorithm using Pixel Shuffling Base 64 Encoding based Chaotic Block Cipher", WSEAS Transactions on computers, Vol. 10, No. 6, pp. 169-178, 2011.
  12. Dongming Chen and Yunpeng Chang, "A Novel Image Encryption Algorithm based on Logistic Maps", Advances in Information Science and Service Sciences, Vol. 3, No. 7, pp. 364-372, 2011.
  13. Sesha Pallavi Indrakanti and P. S. Avadhani, "Permutation based Image Encryption Technique", International Journal of Computer Applications, Vol. 28, No. 8, pp. 45-47, 2011.
  14. G. -H. Chen, C. -L. Yang and S. -L. Xie, "Gradient-Based Structural Similarity for Image Quality Assessment", Proceedings of International Conference on Image Processing, Atlanta, GA, pp. 2929–2932, 2006.
  15. F. Wei, X. Gu and Y. Wang, "Image Quality Assessment using Edge and Contrast Similarity", Proceedings of IEEE International Joint Conference on Neural Networks, Hong Kong, China, pp. 852–855, 2008.
  16. G. Zhai, W. Zhang, X. Yang and Y. Xu, "Image Quality Assessment Metrics based on Multi-Scale Edge Presentation", Proceedings of IEEE Workshop Signal Processing System Design and Implementation, Athens, Greece, pp. 331?336, 2005.
  17. C. -L. Yang, W. -R. Gao and L. -M. Po, "Discrete Wavelet Transform-Based Structural Similarity for Image Quality Assessment", Proceedings of IEEE International Conference on Image Processing, San Diego, pp. 377?380, 2008.
  18. A. Shnayderman, A. Gusev and A. M. Eskicioglu, "An SVD-based Grayscale Image Quality Measure for Local and Global Assessment", IEEE Transaction on Image Processing 15, 422–429, 2006 .
  19. Z. Wang, E. P. Simoncelli and A. C. Bovik, "Multiscale Structural Similarity for Image Quality Assessment", Proceedings of IEEE Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, pp. 1398–1402, 2003.
  20. Parameshachari B D, K M Sunjiv Soyjaudah and Chaitanyakumar M V, "A Study on Different Techniques for Security of an Image", International Journal of Recent Technology and Engineering (IJRTE), Vol. 1, No. 6, Jan 2013.
  21. Parameshachari B D and Dr. K M S Soyjaudah "A New Approach to Partial Image Encryption" Proceedings of ICAdC, AISC 174, pp. 1005–1010, Springer India, 2013.
  22. Arun JB and Reshu Choudhary, "Image Encryption for Secure Data transfer and Image Based Cryptography",International Conference on emerging trends of Research in Applied Science and Computational Technique, Feb 21-22, 2014.
  23. www-db. stanford. edu/~wangz/image. vary. jpg. tar.
  24. Abdelfatah A. Tamini and Ayman M. Abdalla, "Hiding an Image inside another Image using Variable-Rate Steganography", International Journal of Advanced Computer Science and Applications, Vol. 4, No. 10, 2013.
  25. Reshu Choudhary and Arun JB, "Secure Image Transmission and evaluation of Image Encryption", Subbmitted in: IEEE International conference on Recent Advances and Innovations in Engineering, 2014.
  26. Reshu Choudhary and Arun JB, "A Secure Image Transmission with Improved Encryption Technique", Accepted in : National Conference in Wireless Communication and Artificial Intelligence, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Secure Image Retrieval Visual Cryptography Image Quality Measure Feature Protection.