The wide use of digital images and videos in various applications warrant serious attention to the security and privacy issues today. Several encryption techniques have been proposed in recent years as feasible solutions to the protection of digital images and videos. In many applications, such as pay-per-view videos,pay-TV and video on demand, one of the required features is that the quality of the video data be degraded only partially by some encryption technique and the encrypted data must still be partially perceptible. This feature referred to as ‘Perceptual encryption’ is the encryption algorithm that degrades the quality of media content according to security or quality requirements. In this work we propose a simple yet efficient technique for realizing perceptual encryption using geometric objects as kernels based on which the pixels are permuted. Confusion aspect that is required is realized by inserting the kernel on the image and thereby performing transposition of pixels based on the kernel formed out of geometric objects. The various parameters of geometric objects, number of objects and the position of the objects/kernel in the image are used as the key for encryption and later on for decryption. Further a choice of quality of the image required i.e., different levels of degradation is provided by adjusting the above parameters of the objects/kernel.From the results obtained it is evident that the proposed method which is more apt for perceptual encryption can also be used effectively for full image encryption with acceptable level of security.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement and adaptive scaling based on Dual Tree Complex Wavelet Transform (DTCWT) technique. The DTCWT and LWT 2 is applied on cover image and payload respectively to convert spatial domain into transform domain. The HH sub band coefficients of cover image are replaced by the LL sub band coefficients of payload to generate intermediate stego object and the adaptive scaling factor is used to scale down intermediate stego object coefficient values to generate final stego object. The adaptive scaling factor is determined based on entropy of cover image. The security and the capacity of the proposed method are high compared to the existing algorithms.
Pso based optimized security scheme for image authentication and tamper proofingcsandit
The hash function offers an authentication and an integrity to digital images. In this paper an
innovative optimized security scheme based on Particle swarm optimization (PSO) for image
authentication and tamper proofing is proposed. This scheme provide solutions to the issues
such as robustness, security and tamper detection with precise localization. The features are
extracted in Daubechies4 wavelet transform domain with help of PSO to generate the image
hash. This scheme is moderately robust against attacks and to detect and locate the tampered
areas in an image. The experimental results are presented to exhibit the effectiveness of the
proposed scheme.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
Abstract Today the transmission of multimedia data including image and video is growing in telecommunications. Security is one of the main issues in transferring such sensitive information. Powerful image encryption algorithm is the solution for this problem. This paper is an implementation of a color image encryption algorithm based on Rubik’s cube technique. The Rubik’s cube technique is used for pixel permutation and a bit substitution method based on DNA sequences are used to change the value of each pixel on the image. Then the time-stamp is appended with encrypted image, which can be used to identify the replay attack. For evaluating the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation analysis, analysis of NPCR and UACI values etc. Index Terms: Cryptography, encryption, decryption, timestamp, replay attack, plaintext, cipher-text, algorithm, chaos.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement and adaptive scaling based on Dual Tree Complex Wavelet Transform (DTCWT) technique. The DTCWT and LWT 2 is applied on cover image and payload respectively to convert spatial domain into transform domain. The HH sub band coefficients of cover image are replaced by the LL sub band coefficients of payload to generate intermediate stego object and the adaptive scaling factor is used to scale down intermediate stego object coefficient values to generate final stego object. The adaptive scaling factor is determined based on entropy of cover image. The security and the capacity of the proposed method are high compared to the existing algorithms.
Pso based optimized security scheme for image authentication and tamper proofingcsandit
The hash function offers an authentication and an integrity to digital images. In this paper an
innovative optimized security scheme based on Particle swarm optimization (PSO) for image
authentication and tamper proofing is proposed. This scheme provide solutions to the issues
such as robustness, security and tamper detection with precise localization. The features are
extracted in Daubechies4 wavelet transform domain with help of PSO to generate the image
hash. This scheme is moderately robust against attacks and to detect and locate the tampered
areas in an image. The experimental results are presented to exhibit the effectiveness of the
proposed scheme.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
Abstract Today the transmission of multimedia data including image and video is growing in telecommunications. Security is one of the main issues in transferring such sensitive information. Powerful image encryption algorithm is the solution for this problem. This paper is an implementation of a color image encryption algorithm based on Rubik’s cube technique. The Rubik’s cube technique is used for pixel permutation and a bit substitution method based on DNA sequences are used to change the value of each pixel on the image. Then the time-stamp is appended with encrypted image, which can be used to identify the replay attack. For evaluating the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation analysis, analysis of NPCR and UACI values etc. Index Terms: Cryptography, encryption, decryption, timestamp, replay attack, plaintext, cipher-text, algorithm, chaos.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In this paper steganography is used to hide the data inside the images. Steganography is the science that involves
communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. The main goal of
steganography is to ensure that the transmitted message is completely masked, thereby ensuring that the message is accessible
only to the intended receiver and not to any intruders or unauthorized parties. This work focuses on the image steganography with
an image compression using least significant bit with Discrete Wavelet Transform (DWT) on FPGA Spartan III Evaluation
Development Kit (EDK). Current trends support digital image files as the cover file to hide another digital file with secret
message or data. At receiver side, using Inverse Discrete Wavelet transform, both original image as well as hidden data can be
successfully extracted.
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
Steganography is the art of hiding information in ways that avert the revealing of hiding messages. Video Steganography is focused on spatial and transform domain. Spatial domain algorithm directly embedded information in the cover image with no visual changes. This kind of algorithms has the advantage in Steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity. These kinds of algorithms are vulnerable to steganalysis. This paper proposes a new Compressed Video Steganographic scheme. The data is hidden in the horizontal and the vertical components of the motion vectors. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated.
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
A digital watermarking scheme based on integer wavelet transform and histogram techniques is
proposed in this paper. Lifting scheme based integer wavelet transform is used to provide ease of
transformation of compressed data and to increase the data embedding capacity. Also histogram technique
which is one of the reversible data hiding is used to embed the secret data into original image and retrieve the
original data back after extraction. The AES encryption is used to encrypt the embedded image to provide
authentication. This algorithm is developed using verilog code and implemented on FPGA Artix 7 board in
order to increase throughput, reduce area and power consumption.
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
In today�s internet world it is very essential to secretly share biometric data stored in the central database. There are so many options to secretly share biometri c data using cryptographic computation. This work reviews and applies a perfectly secure method to secretly share biometric data,for possible use in biometric authentication and protection based on conc ept of visual cryptography. The basic concept of proposed approach is to secretly share private imag e into two meaningful and unexpanded shares (sheets) that are stored in two separate database servers such that decryption can be performed only when both shares are simultaneously available;at the same ti me,the individual share do not open identity of the private image. Previous research,such as Arun Ross et al. in 2011,was using pixel expansion for encryption,which causes the waste of storage space and transmission time. Furthermore,some researcher such as Hou and Quan�s research in 2011,producing m eaningless shares,which causes visually revealing existence of secret image. In this work,we review visual cryptography scheme and apply them to secretly share biometric data such as fingerprint,face images for the purpose of user authentication. So,using this technique we can secretly share biometric data over internet and only authorized user can decrypt the information.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
With the rapid development of technology, and the popularization of internet, communication is been greatly promoted. The communication is not limited only to information but also includes multimedia information like digital Images. Therefore, the security of digital images has become a very important and practical issue, and appropriate security technology is used for those digital images containing confidential or private information especially. In this paper a novel approach of Image scrambling has been proposed which includes both spatial as well as Transform domain. Experimental results prove that correlation obtained in scrambled images is much lesser then the one obtained in transformed images.
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...IJNSA Journal
Authentication is one of the image security issues solved by hash function and another one issue is
providing security for illegal manipulation of digital image is solved by an encryption. An optimized hybrid
image security mechanism for authentication and secrecy of images by means of Particle Swarm
Optimization (PSO) in daubechies4 transform is illustrated in this paper. This mechanism provide
solutions to the issues such as authentication, robustness, security and statistical attacks. The PSO
technique is employed to select feature vectors to form the image hash and select high energy coefficients
for partial encryption. The shuffling of bits , coefficients and blocks of an image is performed by
interweaving technique. The Completeness of Signature (CoS) is used to recognize the image as authentic
or unauthentic. The image quality distortion is computed with help of image quality index metric(IQIM)
with respect to three factors namely loss of correlation, luminance distortion, and contrast distortion. The
experimental results are computed with respect to CoS, IQIM, PSNR and correlation coefficient and
presented to demonstrate the efficacy of the proposed scheme.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In this paper steganography is used to hide the data inside the images. Steganography is the science that involves
communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. The main goal of
steganography is to ensure that the transmitted message is completely masked, thereby ensuring that the message is accessible
only to the intended receiver and not to any intruders or unauthorized parties. This work focuses on the image steganography with
an image compression using least significant bit with Discrete Wavelet Transform (DWT) on FPGA Spartan III Evaluation
Development Kit (EDK). Current trends support digital image files as the cover file to hide another digital file with secret
message or data. At receiver side, using Inverse Discrete Wavelet transform, both original image as well as hidden data can be
successfully extracted.
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
Steganography is the art of hiding information in ways that avert the revealing of hiding messages. Video Steganography is focused on spatial and transform domain. Spatial domain algorithm directly embedded information in the cover image with no visual changes. This kind of algorithms has the advantage in Steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity. These kinds of algorithms are vulnerable to steganalysis. This paper proposes a new Compressed Video Steganographic scheme. The data is hidden in the horizontal and the vertical components of the motion vectors. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated.
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
A digital watermarking scheme based on integer wavelet transform and histogram techniques is
proposed in this paper. Lifting scheme based integer wavelet transform is used to provide ease of
transformation of compressed data and to increase the data embedding capacity. Also histogram technique
which is one of the reversible data hiding is used to embed the secret data into original image and retrieve the
original data back after extraction. The AES encryption is used to encrypt the embedded image to provide
authentication. This algorithm is developed using verilog code and implemented on FPGA Artix 7 board in
order to increase throughput, reduce area and power consumption.
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
In today�s internet world it is very essential to secretly share biometric data stored in the central database. There are so many options to secretly share biometri c data using cryptographic computation. This work reviews and applies a perfectly secure method to secretly share biometric data,for possible use in biometric authentication and protection based on conc ept of visual cryptography. The basic concept of proposed approach is to secretly share private imag e into two meaningful and unexpanded shares (sheets) that are stored in two separate database servers such that decryption can be performed only when both shares are simultaneously available;at the same ti me,the individual share do not open identity of the private image. Previous research,such as Arun Ross et al. in 2011,was using pixel expansion for encryption,which causes the waste of storage space and transmission time. Furthermore,some researcher such as Hou and Quan�s research in 2011,producing m eaningless shares,which causes visually revealing existence of secret image. In this work,we review visual cryptography scheme and apply them to secretly share biometric data such as fingerprint,face images for the purpose of user authentication. So,using this technique we can secretly share biometric data over internet and only authorized user can decrypt the information.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
With the rapid development of technology, and the popularization of internet, communication is been greatly promoted. The communication is not limited only to information but also includes multimedia information like digital Images. Therefore, the security of digital images has become a very important and practical issue, and appropriate security technology is used for those digital images containing confidential or private information especially. In this paper a novel approach of Image scrambling has been proposed which includes both spatial as well as Transform domain. Experimental results prove that correlation obtained in scrambled images is much lesser then the one obtained in transformed images.
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...IJNSA Journal
Authentication is one of the image security issues solved by hash function and another one issue is
providing security for illegal manipulation of digital image is solved by an encryption. An optimized hybrid
image security mechanism for authentication and secrecy of images by means of Particle Swarm
Optimization (PSO) in daubechies4 transform is illustrated in this paper. This mechanism provide
solutions to the issues such as authentication, robustness, security and statistical attacks. The PSO
technique is employed to select feature vectors to form the image hash and select high energy coefficients
for partial encryption. The shuffling of bits , coefficients and blocks of an image is performed by
interweaving technique. The Completeness of Signature (CoS) is used to recognize the image as authentic
or unauthentic. The image quality distortion is computed with help of image quality index metric(IQIM)
with respect to three factors namely loss of correlation, luminance distortion, and contrast distortion. The
experimental results are computed with respect to CoS, IQIM, PSNR and correlation coefficient and
presented to demonstrate the efficacy of the proposed scheme.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
A new partial image encryption method for document images using variance base...IJECEIAES
The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the partially encrypted image. Two levels of diffusion are performed. The first level simply modifies the pixels in the partially encrypted image with the Bernoulli’s chaotic map. The second level establishes the interdependency between rows and columns of the first level diffused image. The experiment is conducted for both partial and complete image encryption on the Document images. The proposed scheme yields better results for both partial and complete encryption on Speed, statistical and dynamical attacks. The results ensure better security when compared to existing encryption schemes.
In recent time, the Steganography technique is broadly used for the secret data communication. It’s an art of hiding the secret data in another objects like videos, images, videos, graphics and documents to gain the stego or steganographic object so which it’s not affected by the insertion. In this paper, we are introducing a new methodology in which security of stego-image increase by embedding even and odd part secret image into R, G, B plane of cover image using LSB and ISB technique. As we can see from the results session the value of PSNR , NCC are getting increase while the value of MSE is getting decrease.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
How world-class product teams are winning in the AI era by CEO and Founder, P...
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 4, August 2013
DOI : 10.5121/ijcsit.2013.5414 165
A NOVEL PERCEPTUAL IMAGE ENCRYPTION
SCHEME USING GEOMETRIC OBJECTS BASED
KERNEL
Prabhudev Jagadeesh1
, P. Nagabhushan2
, R. Pradeep Kumar3
1
Department of Studies in Computer Science, University of Mysore, India
jagadish_prabhu@yahoo.com
2
Department of Studies in Computer Science, University of Mysore, India
pnagabhushan@hotmail.com
3
Amphisoft Technologies Private Limited, Coimbatore, India
rpk.ind@gmail.com
ABSTRACT
The wide use of digital images and videos in various applications warrant serious attention to the security
and privacy issues today. Several encryption techniques have been proposed in recent years as feasible
solutions to the protection of digital images and videos. In many applications, such as pay-per-view videos,
pay-TV and video on demand, one of the required features is that the quality of the video data be degraded
only partially by some encryption technique and the encrypted data must still be partially perceptible. This
feature referred to as ‘Perceptual encryption’ is the encryption algorithm that degrades the quality of
media content according to security or quality requirements. In this work we propose a simple yet efficient
technique for realizing perceptual encryption using geometric objects as kernels based on which the pixels
are permuted. Confusion aspect that is required is realized by inserting the kernel on the image and thereby
performing transposition of pixels based on the kernel formed out of geometric objects. The various
parameters of geometric objects, number of objects and the position of the objects/kernel in the image are
used as the key for encryption and later on for decryption. Further a choice of quality of the image required
i.e., different levels of degradation is provided by adjusting the above parameters of the objects/kernel.
From the results obtained it is evident that the proposed method which is more apt for perceptual
encryption can also be used effectively for full image encryption with acceptable level of security.
KEYWORDS
Image encryption, Video encryption, Perceptual encryption and PSNR.
1. INTRODUCTION
The diverse multimedia services need different security levels and usability requirements, some
of which should be defined and evaluated with human vision ability. A typical example is
perceptual encryption, in which only partial information is encrypted and the encrypted
image/video gives a rough view of the high quality services that are available. This feature makes
it possible for prospective users to access low-quality versions of the multimedia services before
actually buying them. It is desirable that the quality degradation be constantly controlled. Figure.1
shows a pictorial view of perceptual encryption system [1]. Regarding perceptual encryption,
since there does not exist a well-accepted objective measure of visual quality of digital images
and videos, the control factor is generally chosen to represent an estimated measure of the
degradation. Further the control factor selected for the encryption scheme may not have a linear
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 4, August 2013
166
relationship with the visual quality degradation but a larger value always means a stronger
degradation. When the control factor is maximum, the strongest visual quality degradation of the
specific algorithm is reached, which does not necessarily imply that it is the strongest degradation
among all perceptual encryption algorithms.
Figure 1. A typical perceptual encryption system
The rest of this paper is organized as follows. Section 2 presents the related work found in
literature with regard to perceptual encryption. In Section 3, the proposed scheme for image
scrambling based on geometric objects is discussed. Section 4 contains the experiments carried
out and the results obtained. Section 5 presents the security analysis and quality of degradation of
the proposed approach. Finally, Section 6 concludes the paper highlighting the research
accomplishments and also proposing future directions.
2. RELATED WORK
In recent years, few perceptual encryption schemes have been proposed for images and videos [2-
5]. In [6,14] perceptual encryption based on selectively encrypting some combination of
bitplanes in the spatial domain and in the DCT or wavelet domain is proposed. Since different
bitplanes have different significance for the quality of media content, the quality of encrypted
images corresponding to different bitplanes being encrypted is tested. Generally, the encrypted
image is unintelligible when at least seven bitplanes are encrypted. In [7] a perceptual image
encryption scheme using iterative operation of local pixel shuffling and reversible histogram
spreading is proposed in which image’s local details are visually better encrypted compared to
ordinary shuffling schemes. In [8], three variants to transparently encrypt JPEG2000 images are
compared from a perceptual quality viewpoint. Here the focus is to predict the subjective quality
of the encrypted images as given by the mean opinion score with available objective quality
metrics. Furthermore, the objective quality measure that best suite an image quality for which a
certain subjective quality is required is demonstrated. The selective encryption algorithms
proposed in [9] is a special case of the perceptual encryption for images compressed with wavelet
packet decomposition. In [10] the proposed technique performs the functions of encryption and
watermarking simultaneously based on their respective key. The perceptual encryption scheme is
based on AC component. The watermarking approach utilizes the DC component that is
perceptually significant part, to embed the watermark. In [11], the encryption algorithm can be
adjusted to produce cipher-image with varying perceptual distortion. Also the decryption
algorithm is able to reconstruct the original image even if the encrypted image is JPEG
compressed.
Perceptual
Encryption
system
Encryption
key
Plain
image
Encrypted
image
Degradation
control factor
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 4, August 2013
167
3. PROPOSED APPROACH
In the proposed work the security of the digital image is enforced employing the concept of
perceptual security which refers to encrypted data’s intelligibility. For data like image one need
not completely encrypt the entire image but instead security can be provided if the image is made
incomprehensible. The proposed work is a permutation based approach where the transpositions
of pixels are guided by the kernel formed out of geometric objects. Basic geometric objects viz.,
Square, Rectangle, Circle and Triangle are used for transposition of pixels. The combination of
various objects forms the kernel which defines the swapping pattern for the pixels. The pixels are
shuffled according to the various objects and the swapping patterns defined for individual objects.
The transposition of pixels as defined by the kernel results in a type of non-linear fashion of
shuffling. The objects and the swapping patterns are listed in Figure. 2. The various objects
and the swapping pattern make up the key for encryption and decryption. The position of the
objects or the kernel is altered repeatedly as predefined to obtain the required level of
degradation. During this process a pixel may undergo multiple swapping. For decryption the
same algorithm is carried out, but now the shuffling of pixels is done considering the geometric
objects in the reverse order. The overall design of the proposed technique is shown in Figure. 3.
a. SO b. SD c. SA d. RO
e. CO f. CD g. TO
Figure 2. Various Geometric objects and the swapping patterns.
SO - Square with opposite pixel swapping SD - Square with diagonal pixel swapping
SA - Square with adjacent pixel swapping RO - Rectangle with opposite pixel swapping
CO - Circle with opposite pixel swapping CD - Circle with diagonal pixel swapping
TO - Triangle with opposite pixel swapping
3.1 Algorithm
Step 1: Define various geometric objects as Abstract Data Types.
Step 2: Define the various swapping patterns for each object as operations that can be carried out
on the different objects defined in ADT.
Step 3: Select the geometric objects to be used for scrambling the image from the set of objects
defined in Figure.1 to form a kernel.
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 4, August 2013
168
Step 4: For each object selected, define the various parameters namely dimension, starting-
position-point, swapping pattern, step-size-of-dimension, step-size-of- position-point and the
number-of-iterations.
Step 5: Form the key based on the objects selected and its various parameters.
Step 6: Place the object in the position as defined by the starting-position-point of the object in
the key.
Step 7: Swap the pixels as defined by the swapping pattern in the key.
Step 8: Alter the dimension and position point of the object based on the step-size-of-dimension
and step-size-of position-point respectively.
Step 9: Repeat step 7 and step 8 till the terminating condition based on number-of-iterations is
reached.
Step 10: For each object in the kernel perform step 6 to 9.
Figure 3. Proposed Perceptual Image Scrambling System
4. EXPERIMENTAL RESULTS
The proposed algorithm was tested on several standard images. The results obtained for images in
Figure.4 are shown in Figure.5 – Figure.8. The results specify images with varied levels of
perceptual quality, controlled by degradation level by varying the different parameters of the
kernel.
Plain
image
Place Kernel
on image
Pixel
Permutation
Alter
Kernel/Objects
parameters
Scrambled
image
Geometric
Objects
Kernel
formation
Key
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 4, August 2013
169
Image 1 Image 2
Figure 4. Plain-images
a b c d
PSNR=16.667 PSNR=15.381 PSNR=13.720 PSNR=12.242
Figure 5. Perceptually Scrambled images with the kernel formed by objects (SO,CD)
a b c d
PSNR=15.835 PSNR=14.419 PSNR=14.162 PSNR=11.988
Figure 6. Perceptually Scrambled images with the kernel formed by objects (SO,RO,CD,TO)
a b c d
PSNR=15.895 PSNR=14.626 PSNR=12.945 PSNR=11.536
Figure 7. Perceptually Scrambled images with the kernel formed by objects (CD,SO)
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 4, August 2013
170
a b c d
PSNR=15.205 PSNR=13.771 PSNR=13.471 PSNR=11.197
Figure 8. Perceptually Scrambled images with the kernel formed by objects (SO,CD,TO,RO)
5. SECURITY ANALYSIS OF THE PROPOSED SCHEME
5.1 Perceptual Security
Since multimedia content has more redundancy than text or binary data, the encrypted data may
still be somewhat comprehensible. Perceptual security which refer to the encrypted data’s
intelligibility can be measured both by subjective and objective metrics. In a subjective metric,
scorers are asked to rate the scrambled data’s quality level for various scrambled data of different
quality. The typical quality levels for a subjective metric are ‘completely understandable’,
‘partially understandable’, and ‘not understandable’ [14]. ‘Completely understandable’ denotes
that the scrambled image is completely understandable and even is of good quality. In this case,
the encryption is considered to be not successful. ‘Partially understandable’ indicates that only a
few parts of the scrambled image can be understood. For instance, only the shape is
understandable, while the texture is uncertain. In this case, the scrambling is only suitable for
applications not requiring high security. ‘Not understandable’ indicates that the scrambled image
is completely incomprehensible which implies scrambling is successful in perceptual aspects.
An objective metric provides more efficient test methods and is suitable for computer based
analysis. Naturally, the metric should be based on multimedia understanding techniques. As
subjective assessments are expensive and time consuming, it is difficult to implement them onto a
real time system. Objective assessments are automatic and mathematical defined. Subjective
measurements can be used to corroborate the usefulness of objective measurements. Therefore
objective methods have engrossed more attentions in recent years [12]. Thus, the quality metrics
are more often used as the objective metric of encrypted data. The classic metric for audio quality
is signal-to-noise ratio (SNR), and the one for image is peak signal-to-noise ratio (PSNR) [13]. In
this work PSNR analysis is carried out to measure the quality of degradation and thereby the
effectiveness of the proposed method. PSNR which is normally used to measure images’ quality
losses caused by operations such as compression, noising and transmission errors is computed by
comparing the original image and the processed image.
Let P=p0 p1. . . pn-1 be the Plain-image and C=c0 c1 . . . cn-1 be the Scrambled-image.
Also (0 ≤ pi , ci ≤ L-1, i=0,1,…,n-1)
Scrambled-image’s PSNR is computed as,
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 4, August 2013
171
where ,
Here, L is the pixel’s gray level. For an 8-bit image, L=256. Generally, the bigger PSNR is, higher
is the scrambled-image’s quality. Thus for a good image encryption algorithm, the PSNR of the
scrambled-image should be small enough for concealing the content. As indicated in
Figure.5 - Figure.8, smaller PSNR values obtained for higher degradation and larger PSNR values
for lesser degradation corroborate the desired property of an efficient image encryption algorithm.
5.2 Correlation Analysis
Correlation coefficient can be used to measure the correlation between two pixels. An efficient
image scrambling technique should strive to achieve lower correlation coefficient in scrambled
image. To examine the correlation property of two horizontally adjacent pixels, two vertically
adjacent pixels and also two diagonally adjacent pixels for the original image and scrambled
image, 1000 pairs of adjacent pixels were selected randomly and the correlation coefficient of
each pair is computed using Equations below:
Here x and y are grayscale values of two adjacent pixels in the image. Correlation coefficient
values obtained for the perceptual scrambling of Image 1 and Image 2( Figure 6 and Figure 8) is
shown in Table 1 as an instance. Higher value of correlation coefficient of original image
indicates pixels in original image are highly correlated, whereas the smaller value of correlation
coefficient of scrambled images indicate lesser correlation between image pixels which is the
property desired from any image scrambling technique. Further the decrease in values of
correlation coefficient as the degradation is increased corroborates the PSNR values obtained
earlier.
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 4, August 2013
172
Table 1. Correlation Coefficient of Original Image and Scrambled Images
Correlation
Coefficient
Image 1 Image 2
Original
image
Scrambled images Original
image
Scrambled images
a b c d a b c d
Horizontal
0.9844 0.4513 0.2464 0.2050 0.0459 0.9455 0.4555 0.2507 0.1951 0.0602
Vertical 0.9752 0.4417 0.2396 0.1606 -
0.0261
0.9643 0.4890 0.2780 0.2220 0.0702
Diagonal 0.9685 0.3770 0.2391 0.1582 -
0.0146
0.9828 0.4612 0.2500 0.1859 -
0.0223
6. CONCLUSION
In the proposed work the confidentiality of digital image is enforced by employing the concept of
perceptual security. Instead of complete encryption of image, the image is only partially
scrambled to bring in the required quality of degradation. Pixel permutation is supervised by the
kernel formed by various geometric objects. The combination of various geometric objects and
several options of swapping patterns provides a kind of non-linear permutation of pixels. The
objective analysis carried out by measuring the peak signal to noise ratio between original image
and scrambled image indicates that scrambling is successful with regard to perceptual aspect. The
results obtained indicates, though the proposed method suite perceptual encryption of images, the
same algorithm when employed with more complex kernels, acts as an efficient image scrambling
scheme. As an enhancement, instead of pixel-permutation, image-block permutation can be
employed as this would further reduce the computational complexity. Thus, the proposed
technique can be used either for lightweight encryption in which the scrambled image has a
degraded visual quality but reveals the contents of the original image, or for strong encryption in
which the scrambled image does not reveal any information about the original image.
REFERENCES
[1] S. Li, G. Chen, A. Cheung, B. Bhargava, and K.-T. Lo, (2007), “On the design of perceptual MPEG-
Video encryption algorithms”, IEEE Transactions on Circuits and Systems for Video Technology, pp
214–223.
[2] Parameshachari B D, K M Sunjiv Soyjaudah, Chaitanyakumar M V, (2013), “A Study on Different
Techniques for Security of an Image”, International Journal of Recent Technology and Engineering
(IJRTE), Volume-1, Issue-6.
[3] A. Torrubia and F. Mora, “Perceptual cryptography on MPEG layer III bit-streams”, (2002), IEEE
Trans. Consumer Eletronics, vol. 48, no. 4, pp.1046–1050.
[4] S. Lian, J. Sun, and Z. Wang, (2004), “Perceptual cryptography on SPIHT compressed images or
videos”, IEEE International Conference on Multimedia and Expro (I) , Vol. 3, pp 2195–2198.
[5] Potdar, U, Talele, K.T, Gandhe, S.T, (2010), “Perceptual video encryption for multimedia
applications”, Second International Conference on Computer Engineering and Applications.
[6] Khan, Jeoti, Khan, M,A, (2010), “Perceptual encryption of JPEG compressed images using DCT
coefficients and splitting of DC coefficients into bitplanes”, International Conference on Intelligent
and Advanced Systems.
[7] Bian Yang, Busch, C, XiaMu Niu, (2009), “Perceptual image encryption via reversible histogram
spreading”, Proceedings of 6th
International Symposium on Image and Signal Processing and
Analysis, 2009.
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 4, August 2013
173
[8] A. Torrubia, and F. Mora, (2003), “Perceptual cryptography of JPEG compressed images on the JFIF
bit-stream domain”, IEEE International Symposium on Consumer Electronics, ISCE.
[9] S. Lian, X. Wang, J. Sun, and Z. Wang, (2004), “ Perceptual cryptography on wavelet transform
encoded videos”, International Symposium on Intelligent Multimedia, Video and Speech Processing.
[10] Khan, M.I., Jeoti, V., Malik, A.S, (2010), “Designing a joint perceptual encryption and blind
watermarking scheme compliant with JPEG compression standard”, International Conference on
Computer Applications and Industrial Electronics , pp 688-691.
[11] Ahmed, F., Siyal, M.Y. ; Abbas, V.U, (2010), “A Perceptually Scalable and JPEG Compression
Tolerant Image Encryption Scheme”, Fourth Pacific-Rim Symposium on Image and Video
Technology.
[12] Parameshachari B D, K M Sunjiv Soyjaudah, Sumithra Devi K A, (2013), “Image Quality
Assessment for Partial Encryption Using Modified Cyclic Bit Manipulation”, International Journal of
Innovative Technology and Exploring Engineering .
[13] Siu-Kei Au Yeung, Shuyuan Zhu, Bing Zeng, (2010), “Quality assessment for a perceptual video
encryption system”, IEEE International Conference on Wireless Communications, Networking and
Information Security.
[14] Shiguo Lian, (2008), Multimedia Content Encryption – Techniques and Applications, CRC Press.
[15] W. Zeng, H. Yu, and C.-Y. Lin, Eds, (2006), Multimedia Security Technologies for Digital Rights
Management, Academic Press, Inc.
[16] Furht , Kirovsk, (2005), Multimedia Security Handbook, CRC Press.
Authors
Prabhudev Jagadeesh, is currently pursuing PhD at University of Mysore, India. He completed his B.E
degree in Computer Science and Engineering in 1997 from University of Mysore and M.Tech degree in
Software Engineering in 2001 from VTU, Belgaum, India. He has over 15 years of teaching and research
experience. His areas of research include Computer Vision and Information Security.
Dr. P Nagabhushan (BE-1980, M.Tech.1983, PhD-1989) is presently Professor, Department of Studies in
Computer Science and also Chief Nodal Officer, Credit based choice based Education, University of
Mysore, Mysore. He is an active Researcher in the areas pertaining to Pattern Recognition, Document
Image Processing, Symbolic Data Analysis and Data Mining. Till now he has successfully supervised 22
PhD candidates. He has over 400 publications in journals and conferences of International repute. He has
chaired several international conferences. He is a visiting professor to USA, Japan and France. He is a
fellow of Institution of Engineers (FIE) and Institution of Electronics and Telecommunication Engineers
(FIETE) India.
Dr. R.Pradeep Kumar is CEO of Amphisoft Technologies Private Ltd., Coimbatore, India. He holds PhD
in Computer Science from University of Mysore. His areas of research include Image Processing, Video
Analytics, Symbolic data, Knowledge Engineering. He is currently supervising 7 PhD candidates under
Anna University. He has served as Head of Training and R&D sections at TCS Chennai. He has more than
25 publications in his areas of research.