SlideShare a Scribd company logo
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013




        SECURE IMAGE TRANSFER IN THE DOMAIN
                  TRANSFORM DFT
           Rakotondraina Tahina Ezéchiel1 and Rakotomalala Mamy Alain2

      Department of Telecommunication, High School Polytechnic of Antananarivo,
                        University of Antananarivo, Madagascar
                                 1
                                     tahina.ezechiel@gmail.com
      Department of Telecommunication, High School Polytechnic of Antananarivo,
                        University of Antananarivo, Madagascar
                                 2
                                     rakotomamialain@yahoo.fr

ABSTRACT
This paper presents a new approach for secure image transmission. It consists of three treatments
including: a compression based on Discrete Fourier Transform (DFT), a use of symmetric encryption
Advanced Encryption Standard (AES) and a Data Hidden Insertion technique for the transport of sensitive
information.

KEYWORDS
DFT, Cryptography, Watermarking, LSFR, Secure Image Transmission

1. INTRODUCTION

Our research is based on the combination of three methods of information processing.
Firstly, the information to be transferred, an image, undergoes a source coding which is a
compression of the signal used for the purpose of eliminating all redundancy and optimize the
computing power. For this we used the Discrete Fourier Transform on digital information. The
use of this mode is that, firstly, the DFT coefficients represent the image as a complex form,
which increases the choice of the use of these coefficients and, secondly, it simplifies the matrix
representation of the image and reduces the number of calculations and manipulations to do [1].

Secondly, we developed an algorithm for generating random key that is able to provide session
keys used to encrypt the information. The encryption algorithm used is AES, this symmetric
encryption algorithm is known, used and implemented in various computer systems because of its
speed and robustness against various types of known attacks, according to [2]. The encryption
system operates only on a part of the information, we use a selective encryption. We therefore
chose a part of the representation of the image obtained after the use of the Fourier transform,
which represents the coefficients representative of the information, that is to say, the real part of
the transform.

Thirdly, for the transport of the session keys, which will be used for decryption, we insert them in
the other part of the coefficients, which is the imaginary part. For this, we used an additive
watermarking technique because of his resistance to the types of geometric attacks [3]. We
present two techniques that differ from each other by their robustness against attacks.


DOI:10.5121/ijcis.2013.3101                                                                           1
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013

2. PROPOSED APPROACH

At the emission, we have the diagram (Figure 1). At the reception, the restitution of the
information is done through a series of reverse operation to that proposed.


                                 Original Image


                                       DFT


     Imaginary Part                                             Real Part


                                                            Pseudo-random
                                                           number generator
                                                               (LSFR)

                                                                                    Symmetric
     watermarking                                                  key              encryption


     Imaginary Part                                                                  Real Part
      watermaked                                                                      crypted
                                         Crypted-
                                    watermarked Image


                                     Figure 1. Emission Datagram

3. RESULTS AND INTERPRETATION
As the encryption method used is a symmetric encryption, the same key will still be used for
decryption at the receiver. To enable secure sharing of the session key we insert and hide it in
another part of the information to be sent. For this, we used a technique for watermarking
information. The type of data insertion is based on watermarking robust to compression and
geometric transformation such as rotation and translation, explicitly as in [4] and [5]. For this, we
chose to use the additive watermarking method.

It should be noted that in the program, we added different techniques of diffusion and confusion
to make the algorithm difficult to understand by a cryptanalyst, but rapid at the same time. Series
of test are carried out on a personal Computer running with Intel Pentium Dual Core 2.2 GHz
with 3072 MB of RAM.

We can see at the Figure 2 that the operation generates a loss of information equivalent to the
“peak signal to noise ratio” PSNR = 31.3674 dB, a “mean square error” MSE = 47.4619 and a
“maximum of deviation quadratic” maxerr = 38.9445. The method used in this section has been
applied in the LSB of each pixel, which is why this method is more robust as we come again to
extract the session key after an attack by median filtering and after adding noise type "salt and
pepper". This approach does not stand face to geometrical attacks.
                                                                                                      2
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013

          Original Image               Crypted-watermarked                    Reconstitute
                                       Image                                  Image




                                              Histogram of                      Histogram of
      Histogram of Original                     Crypted-                      Reconstitute Image
      Image                                watermarked Image




  Figure 2. Column 1: original image and his histogram, column 2 : crypted-watermarked image and his
                      histogram, column 3 : reconstitute image and his histogram

The correlation between the original image and the reconstructed image is corr = 0.9933, which
corresponds to an acceptable result according to its importance [3]. Table 1 shows the
effectiveness of the program both on transmission and reception. The implementation of this
program is optimized when using on a platform with limited resources such as embedded systems
or cameras.

                              Table 1: Implementation time of the algorithm


                                           Implementation
                                                                  CPU Time
                                                time

                       Transmission            0.4315 s            0.4212 s

                           Reception           0.0829 s            0.0936 s


In a second approach, shown in Figure 3, the operation is done not on the least significant bits,
but rather on the set of bits. Therefore, we are faced with much loss of information at reception
because we use the low coefficients of the image obtained after the Fourier transform.




                                                                                                       3
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013

         Original Image                crypted-watermaked Image               Reconstitute Image




      Histogram of Original               Histogram crypted-                    Histogram of
             Image                        watermaked Image                    Reconstitute Image




   Figure 3. Column 1: original image and his histogram, column 2: crypted-watermarked image and his
                       histogram, column 3: reconstitute image and his histogram

We have the following results:

                                         Table 2 : Results obtain


                       PSNR (dB)            MSE            Maxerr         Corr

                          7.1407         1.256 e+4       1.364e+3       -0.0028


It should be noted that this second method is not resistant against attacks by scrambeling, filters
and geometric transformation. After each attack, we do not found the watermark.

                              Table 3: Implementation time of the algorithm


                                          Implementation time        CPU Time

                      transmission               0.6518 s             0.5772 s

                       Réception                 0.1000 s             0.0936 s


The second case differs from the first on the right way to represent the coefficients of the real part
of the image compared with the encryption key, that is to say, by choosing to operate on the least
significant bits.


                                                                                                       4
International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013

4. CONCLUSIONS

Our approach is based on the use of the representation of the image coefficients in complex form
as a result of processing by DFT. We have seen that it is advantageous to use a selective treatment
of the image especially for the manipulation and representation of the matrix. This approach
optimizes the speed in processing time and enables parallelization of the encryption operation and
watermarking. This approach is well suited to environments with low material resources and
memory space. For robustness, the combination of AES encryption and additive watermarking is
more advantageous. AES is often recommended for symmetric encryption and additive
watermarking widely used, both are known for their resistance against the types of attacks known
and very common.

REFERENCES
[1]   Jerry Gibson (2000) Handbook of Image and Video processing, Academic Press Series in
      Communications, Networking and Multimedia, Al Bovik.
[2]   Biggs Norman (2008) Codes: An Introduction to Information Communication and Cryptography,
      Springer.
[3]   Cox, Miller & Bloom (2002) Digital watermarking, Morgan Kaufmann Publishers Inc.
[4]   Chang, Hwang, & Chen, (2001) “A new encryption algorithm for image cryptosystems”, The Journal
      of Systems and Software, No.58, pp 83–91.
[5]   T. Li, (2004) “Digital fragile watermarking scheme for authentication of JPEG images”, IEEE
      Proceedings Vision, Image and Signal Processing, pp.460-466.

Authors

Tahina E. Rakotondraina was born in Antsirabe, Madagascar on 1984. He received his
M.S. in 2010 at University of Antananarivo (Madagascar). He works as a Teacher
assistant and a Ph.D. student at High School Polytechnic of Antananarivo. His currents
research interests include Cryptography, multimedia, Information Hiding, VOIP. He is a
author of one paper published in international journal.

Mamy A. Rakotomalala was born in Antananarivo, Madagascar, on 1970. He received
his Ph.D. in Computer Science and Information Engineering in 2011. He served since
2010 as a professor at High School Polytechnic of Antananarivo. His current research
interests include Images compression, multimedia, computer vision, information Hiding.




                                                                                                        5

More Related Content

What's hot

11.compression technique using dct fractal compression
11.compression technique using dct fractal compression11.compression technique using dct fractal compression
11.compression technique using dct fractal compression
Alexander Decker
 
Compression technique using dct fractal compression
Compression technique using dct fractal compressionCompression technique using dct fractal compression
Compression technique using dct fractal compression
Alexander Decker
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
ijcisjournal
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital images
IDES Editor
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
eSAT Publishing House
 
Image Compression Using Wavelet Packet Tree
Image Compression Using Wavelet Packet TreeImage Compression Using Wavelet Packet Tree
Image Compression Using Wavelet Packet Tree
IDES Editor
 
G0523444
G0523444G0523444
G0523444
IOSR Journals
 
Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOM
IDES Editor
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
IJCSEA Journal
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
IJNSA Journal
 
An enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAn enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hiding
Alexander Decker
 
Hybrid compression based stationary wavelet transforms
Hybrid compression based stationary wavelet transformsHybrid compression based stationary wavelet transforms
Hybrid compression based stationary wavelet transforms
Omar Ghazi
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Publishing House
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
IJERA Editor
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
IDES Editor
 
An efficient fusion based up sampling technique for restoration of spatially ...
An efficient fusion based up sampling technique for restoration of spatially ...An efficient fusion based up sampling technique for restoration of spatially ...
An efficient fusion based up sampling technique for restoration of spatially ...
ijitjournal
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
CSCJournals
 
Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 

What's hot (18)

11.compression technique using dct fractal compression
11.compression technique using dct fractal compression11.compression technique using dct fractal compression
11.compression technique using dct fractal compression
 
Compression technique using dct fractal compression
Compression technique using dct fractal compressionCompression technique using dct fractal compression
Compression technique using dct fractal compression
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Novel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital imagesNovel DCT based watermarking scheme for digital images
Novel DCT based watermarking scheme for digital images
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
Image Compression Using Wavelet Packet Tree
Image Compression Using Wavelet Packet TreeImage Compression Using Wavelet Packet Tree
Image Compression Using Wavelet Packet Tree
 
G0523444
G0523444G0523444
G0523444
 
Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOM
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
An enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAn enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hiding
 
Hybrid compression based stationary wavelet transforms
Hybrid compression based stationary wavelet transformsHybrid compression based stationary wavelet transforms
Hybrid compression based stationary wavelet transforms
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
 
An efficient fusion based up sampling technique for restoration of spatially ...
An efficient fusion based up sampling technique for restoration of spatially ...An efficient fusion based up sampling technique for restoration of spatially ...
An efficient fusion based up sampling technique for restoration of spatially ...
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 

Viewers also liked

Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
ijcisjournal
 
An Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On SigncryptionAn Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On Signcryption
ijcisjournal
 
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsA novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systems
ijcisjournal
 
Translation of sign language using generic fourier descriptor and nearest nei...
Translation of sign language using generic fourier descriptor and nearest nei...Translation of sign language using generic fourier descriptor and nearest nei...
Translation of sign language using generic fourier descriptor and nearest nei...
ijcisjournal
 
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
ijcisjournal
 
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
ijcisjournal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
 
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
ijcisjournal
 
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
ijcisjournal
 
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...
ijcisjournal
 
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
ijcisjournal
 
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
ijcisjournal
 
128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder 128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder
ijcisjournal
 
Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images
ijcisjournal
 
A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishing
ijcisjournal
 
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
ijcisjournal
 
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square AlgorithmImpedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
ijcisjournal
 
Design of Tripl-Band CPW FED Circular Fractal Antenna
Design of Tripl-Band CPW FED Circular Fractal Antenna Design of Tripl-Band CPW FED Circular Fractal Antenna
Design of Tripl-Band CPW FED Circular Fractal Antenna
ijcisjournal
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
ijcisjournal
 

Viewers also liked (19)

Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
 
An Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On SigncryptionAn Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On Signcryption
 
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsA novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systems
 
Translation of sign language using generic fourier descriptor and nearest nei...
Translation of sign language using generic fourier descriptor and nearest nei...Translation of sign language using generic fourier descriptor and nearest nei...
Translation of sign language using generic fourier descriptor and nearest nei...
 
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
 
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...Comparative Performance Analysis of Low Power Full Adder Design in Different ...
Comparative Performance Analysis of Low Power Full Adder Design in Different ...
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
 
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
Slope at Zero Crossings (ZC) of Speech Signal for Multi-Speaker Activity Dete...
 
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...
Content Based Image Retrieval Using Gray Level Co-Occurance Matrix with SVD a...
 
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
An Optimized Device Sizing of Two-Stage CMOS OP-AMP Using Multi-Objective Gen...
 
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
Improvement of Search Algorithm for Integral Distinguisher in Subblock-Based ...
 
128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder 128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder
 
Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images Target Detection Using Multi Resolution Analysis for Camouflaged Images
Target Detection Using Multi Resolution Analysis for Camouflaged Images
 
A survey on privacy preserving data publishing
A survey on privacy preserving data publishingA survey on privacy preserving data publishing
A survey on privacy preserving data publishing
 
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
 
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square AlgorithmImpedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
Impedance Cardiography Filtering Using Non-Negative Least-Mean-Square Algorithm
 
Design of Tripl-Band CPW FED Circular Fractal Antenna
Design of Tripl-Band CPW FED Circular Fractal Antenna Design of Tripl-Band CPW FED Circular Fractal Antenna
Design of Tripl-Band CPW FED Circular Fractal Antenna
 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
 

Similar to Secure Image Transfer in The Domain Transform DFT

AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
ijcseit
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
IJET - International Journal of Engineering and Techniques
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
ssusere02009
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
cscpconf
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Associate Professor in VSB Coimbatore
 
5 1-10
5 1-105 1-10
5 1-10
idescitation
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
eSAT Journals
 
Ge3611231125
Ge3611231125Ge3611231125
Ge3611231125
IJERA Editor
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
ijsrd.com
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
IOSR Journals
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
International Journal of Technical Research & Application
 

Similar to Secure Image Transfer in The Domain Transform DFT (20)

AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
 
5 1-10
5 1-105 1-10
5 1-10
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
Ge3611231125
Ge3611231125Ge3611231125
Ge3611231125
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic AlgorithmImage Watermarking in Spatial Domain Using QIM and Genetic Algorithm
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 
1674 1677
1674 16771674 1677
1674 1677
 
1674 1677
1674 16771674 1677
1674 1677
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Secure Image Transfer in The Domain Transform DFT

  • 1. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 SECURE IMAGE TRANSFER IN THE DOMAIN TRANSFORM DFT Rakotondraina Tahina Ezéchiel1 and Rakotomalala Mamy Alain2 Department of Telecommunication, High School Polytechnic of Antananarivo, University of Antananarivo, Madagascar 1 tahina.ezechiel@gmail.com Department of Telecommunication, High School Polytechnic of Antananarivo, University of Antananarivo, Madagascar 2 rakotomamialain@yahoo.fr ABSTRACT This paper presents a new approach for secure image transmission. It consists of three treatments including: a compression based on Discrete Fourier Transform (DFT), a use of symmetric encryption Advanced Encryption Standard (AES) and a Data Hidden Insertion technique for the transport of sensitive information. KEYWORDS DFT, Cryptography, Watermarking, LSFR, Secure Image Transmission 1. INTRODUCTION Our research is based on the combination of three methods of information processing. Firstly, the information to be transferred, an image, undergoes a source coding which is a compression of the signal used for the purpose of eliminating all redundancy and optimize the computing power. For this we used the Discrete Fourier Transform on digital information. The use of this mode is that, firstly, the DFT coefficients represent the image as a complex form, which increases the choice of the use of these coefficients and, secondly, it simplifies the matrix representation of the image and reduces the number of calculations and manipulations to do [1]. Secondly, we developed an algorithm for generating random key that is able to provide session keys used to encrypt the information. The encryption algorithm used is AES, this symmetric encryption algorithm is known, used and implemented in various computer systems because of its speed and robustness against various types of known attacks, according to [2]. The encryption system operates only on a part of the information, we use a selective encryption. We therefore chose a part of the representation of the image obtained after the use of the Fourier transform, which represents the coefficients representative of the information, that is to say, the real part of the transform. Thirdly, for the transport of the session keys, which will be used for decryption, we insert them in the other part of the coefficients, which is the imaginary part. For this, we used an additive watermarking technique because of his resistance to the types of geometric attacks [3]. We present two techniques that differ from each other by their robustness against attacks. DOI:10.5121/ijcis.2013.3101 1
  • 2. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 2. PROPOSED APPROACH At the emission, we have the diagram (Figure 1). At the reception, the restitution of the information is done through a series of reverse operation to that proposed. Original Image DFT Imaginary Part Real Part Pseudo-random number generator (LSFR) Symmetric watermarking key encryption Imaginary Part Real Part watermaked crypted Crypted- watermarked Image Figure 1. Emission Datagram 3. RESULTS AND INTERPRETATION As the encryption method used is a symmetric encryption, the same key will still be used for decryption at the receiver. To enable secure sharing of the session key we insert and hide it in another part of the information to be sent. For this, we used a technique for watermarking information. The type of data insertion is based on watermarking robust to compression and geometric transformation such as rotation and translation, explicitly as in [4] and [5]. For this, we chose to use the additive watermarking method. It should be noted that in the program, we added different techniques of diffusion and confusion to make the algorithm difficult to understand by a cryptanalyst, but rapid at the same time. Series of test are carried out on a personal Computer running with Intel Pentium Dual Core 2.2 GHz with 3072 MB of RAM. We can see at the Figure 2 that the operation generates a loss of information equivalent to the “peak signal to noise ratio” PSNR = 31.3674 dB, a “mean square error” MSE = 47.4619 and a “maximum of deviation quadratic” maxerr = 38.9445. The method used in this section has been applied in the LSB of each pixel, which is why this method is more robust as we come again to extract the session key after an attack by median filtering and after adding noise type "salt and pepper". This approach does not stand face to geometrical attacks. 2
  • 3. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 Original Image Crypted-watermarked Reconstitute Image Image Histogram of Histogram of Histogram of Original Crypted- Reconstitute Image Image watermarked Image Figure 2. Column 1: original image and his histogram, column 2 : crypted-watermarked image and his histogram, column 3 : reconstitute image and his histogram The correlation between the original image and the reconstructed image is corr = 0.9933, which corresponds to an acceptable result according to its importance [3]. Table 1 shows the effectiveness of the program both on transmission and reception. The implementation of this program is optimized when using on a platform with limited resources such as embedded systems or cameras. Table 1: Implementation time of the algorithm Implementation CPU Time time Transmission 0.4315 s 0.4212 s Reception 0.0829 s 0.0936 s In a second approach, shown in Figure 3, the operation is done not on the least significant bits, but rather on the set of bits. Therefore, we are faced with much loss of information at reception because we use the low coefficients of the image obtained after the Fourier transform. 3
  • 4. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 Original Image crypted-watermaked Image Reconstitute Image Histogram of Original Histogram crypted- Histogram of Image watermaked Image Reconstitute Image Figure 3. Column 1: original image and his histogram, column 2: crypted-watermarked image and his histogram, column 3: reconstitute image and his histogram We have the following results: Table 2 : Results obtain PSNR (dB) MSE Maxerr Corr 7.1407 1.256 e+4 1.364e+3 -0.0028 It should be noted that this second method is not resistant against attacks by scrambeling, filters and geometric transformation. After each attack, we do not found the watermark. Table 3: Implementation time of the algorithm Implementation time CPU Time transmission 0.6518 s 0.5772 s Réception 0.1000 s 0.0936 s The second case differs from the first on the right way to represent the coefficients of the real part of the image compared with the encryption key, that is to say, by choosing to operate on the least significant bits. 4
  • 5. International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013 4. CONCLUSIONS Our approach is based on the use of the representation of the image coefficients in complex form as a result of processing by DFT. We have seen that it is advantageous to use a selective treatment of the image especially for the manipulation and representation of the matrix. This approach optimizes the speed in processing time and enables parallelization of the encryption operation and watermarking. This approach is well suited to environments with low material resources and memory space. For robustness, the combination of AES encryption and additive watermarking is more advantageous. AES is often recommended for symmetric encryption and additive watermarking widely used, both are known for their resistance against the types of attacks known and very common. REFERENCES [1] Jerry Gibson (2000) Handbook of Image and Video processing, Academic Press Series in Communications, Networking and Multimedia, Al Bovik. [2] Biggs Norman (2008) Codes: An Introduction to Information Communication and Cryptography, Springer. [3] Cox, Miller & Bloom (2002) Digital watermarking, Morgan Kaufmann Publishers Inc. [4] Chang, Hwang, & Chen, (2001) “A new encryption algorithm for image cryptosystems”, The Journal of Systems and Software, No.58, pp 83–91. [5] T. Li, (2004) “Digital fragile watermarking scheme for authentication of JPEG images”, IEEE Proceedings Vision, Image and Signal Processing, pp.460-466. Authors Tahina E. Rakotondraina was born in Antsirabe, Madagascar on 1984. He received his M.S. in 2010 at University of Antananarivo (Madagascar). He works as a Teacher assistant and a Ph.D. student at High School Polytechnic of Antananarivo. His currents research interests include Cryptography, multimedia, Information Hiding, VOIP. He is a author of one paper published in international journal. Mamy A. Rakotomalala was born in Antananarivo, Madagascar, on 1970. He received his Ph.D. in Computer Science and Information Engineering in 2011. He served since 2010 as a professor at High School Polytechnic of Antananarivo. His current research interests include Images compression, multimedia, computer vision, information Hiding. 5