Open Access Open Access  Restricted Access Subscription or Fee Access

Security Mechanism for Image Authentication Based on Pixels Adaption

Dr. B. D. Parameshachari, Dr. Reshma Banu, P. Rashmi, C. R. Rachana, B. Rajesh Rao

Abstract


Information security is a very important and need desperately in the exponential growth of internet technology. Encryption is one among many techniques to secure useful information with help of sensitive keys. In this paper, a logically sophisticated image encryption scheme is proposed which is based on pixel adaption. XOR (Exclusive-OR) and mod operators with a random key generators are the key parameters for Pixel adaption. Performance is being evaluated through histograms. Encryption implementation is evaluated for different images using MATLAB. Reverse process of encryption is Decryption. Experimental results proves that the scheme is highly key dominated and shows a high immune to brute-force and statistical attacks.


Keywords


Image Encryption, Adaption, Partial Encryption, PSNR, Scan Mapping.

Full Text:

PDF

References


. O. S. Faragallah, “Utilization of Security Techniques for Multimedia Applications”, Ph. D. Thesis, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University, pp.10-20,2007.

. L. Qiao, “Multimedia Security and Copyright Protection”, Ph. D. Thesis, Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, Illinois, USA, pp. 40-50, 1998.

. N. A. V. Ephin M, and Judy Ann Joy, “Survey of Chaos based Image Encryption and Decryption Techniques”, IJCA Proceedings on Amrita International Conference of Women in Computing (AICWIC’13) Proceedings published by International Journal of Computer Applications, no.2 pp. 1–5 ,2013.

. E. Thambiraja, G. Ramesh, and Dr.R.Umarani, “A Survey on Various Most Common Encryption Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 7,pp. 226–233, 2012.

. M. A. El-wahed, S. Mesbah, and A. Shoukry, “Efficiency and Security of Some Image Encryption Algorithms”, in proceedings of the World Congress on Engineering, vol. I, pp. 4–7, 2008.

. Lahieb Mohammed Jawad, and Ghazali Bin Sulong, “A Review of Color Image Encryption Techniques”, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 6, No 1, pp. 266- 275, 2013.

. A. B. Abugharsa, A. S. B. H. Basari, and H. Almangush, “A New Image Encryption Approach using The Integration of A Shifting Technique and The AES Algorithm”, International Journal of Computer Applications, vol. 42, no. 9, pp.38–45, 2012.

. R. Kaur, and E. K. Singh, “Image Encryption Techniques: A Selected Review”, Journal of Computer Engineering (IOSRJCE),vol. 9, no. 6, pp. 80–83, 2013.

. Y. Aumann, M.O. Rabin, “Information-theoretically secure communication in the limited storage space model”, Advances in Cryptology-CRYPTO'99, Lecture Notes in Computer Science, 1666: pp 65-79, Springer-Verlag, 1999.

. Gurpreet Singh and Lovleen Kaur, “Image Cryptography Based Upon Scrambling and Random Integer”, International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014.

. Tanvi, “An Image Cryptosystem based on Pixel Scrambling and AES Algorithm”, International Journal of Computer Applications (0975 – 8887) Volume 80, No1, pp. 15-18, 2013.

. Prabhudev Jagadeesh, P. Nagabhushan, R. Pradeep Kumar, “A Novel Image Scrambling Technique Based On Information Entropy And Quad Tree Decomposition”, International Journal of Computer Science Issues, Vol. 10, Issue 2, No 1, pp. 285-294, 2013.

. Rakesh S, Ajitkumar A Kaller, Shadakshari B C and Annappa B, “Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping”, International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.1,pp 49-57, 2012.

. Parameshachari B D, Dr. K M Sunjiv Soyjaudah,“A New Approach to Partial Image Encryption”, published at Proceedings of ICAdC, AISC 174, pp. 1005–1010, © Springer India 2012.

. Parameshachari B D, Dr. K M Sunjiv Soyjaudah, “Analysis and Comparison of Fully Layered Image Encryption Techniques and Partial Image Encryption Techniques”, published at Proceedings of ICIP 2012, CCIS 292, pp. 599–604, 2012. © Springer-Verlag Berlin Heidelberg 2012.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.