Open Access
Subscription Access
Open Access
Subscription Access
Digital Image Security using Auto Key Generation with Segmentation
Subscribe/Renew Journal
The model for encryption & decryption of an image is designed with the same purposes no needed to send public or private key, first input image then generate auto generated key for image encryption using stream cipher , encrypted image will be divide into four parts then algorithms provided auto sequence number to image, transmit four segmented image, In other end first takes segmented image then all segments merge together then generate auto generated key and using this key decrypt image and analysis quality of image.
Keywords
Image Encryption, Stream Cipher, Auto Generated Key.
Subscription
Login to verify subscription
User
Font Size
Information
- Cross-talk-free double-image encryption and watermarking with amplitude–phase separate modulations X F Meng, L Z Cai, M Z He, G Y Dong and X X Shen Volume 7 Number 11 Create an alert RSS this journal X F Meng et al 2005 J. Opt. A: Pure Appl. Opt. 7 624 doi:10.1088/1464-4258/7/11/002
- R. Lukac and K. Plataniotis. Bit-Level Based Secret Sharing for Image Encryption. Pattern Recognition, 38(5):767–772, May 2005.
- An Image Encryption Approach Using Chaos and Stream Cipher Journal of Theoretical and Applied Information Technology, 2005 - 2010 Jatit & lls1alireza Jolfaei, Abdolrasoul Mirghadri
- S.L. Li, K.C. Leung, L.M. Cheng, C.K. Chan, A novel image hiding scheme based on block difference, Pattern Recognition 39 (6) (2006) 1168–1176.
- A. Rukhin et al., “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications,” NIST Special Publication 800-22, Revision 1a,2010. Processing Conference, Turkey, September 2005.
- Hell. M, Johansson. T, Maximov. A. Meier. W.” A Stream Cipher Proposal: Grain”. IEEE International Symposium on Information Theory, 9-14 July 2006, pp 1614 – 1618.
- M. Sharma and M.K. Kowar, “Image Encryption Techniques Using Chaotic Schemes: a Review,” International Journal of Engineering Science and Technology, vol. 2, No. 6, 2010, pp. 2359–2363.
- A. Jolfaei and A. Mirghadri, “An Applied Imagery Encryption Algorithm Based on Shuffling and Baker's Map,” Proceedings ofThe 2010 International Conference on Artificial Intelligence and Pattern Recognition (AIPR-10), Florida, USA, 2010, pp. 279–285.
- W. Puech and J. Rodrigues, "Crypto-compression of medical Images by selective encryption of DCT", 13th European Signal
- W. Stallings., "Cryptography and Network Security: Principles And Practice," Prentice- Hall, New Jersey, 1999.
- C. Wu and C. Kuo. Design of Integrated Multimedia Compression and Encryption Systems. IEEE Trans. On Multimedia, 7(5):828–839, Oct. 2005.
- D. Taubman, M.W. Marcellin, JPEG2000—Image Compression Fundamentals, Standards and Practice, Kluwer Academic Publishers, Dordrecht, 2002.
- A Digital Watermark R.G. Van Schyndel, A.Z. Tirkel, C.F. Osborne. Department of Physics, Monash University, Clayton, 3168, Australia. 2009
- [Secure Watermarking Scheme for Color Image Using Intensity of Pixel and LSB Substitution Nagaraj V. Dharwadkar and B. B. Amberker. Journal of Computing, Volume 1, Issue 1, December 2009, ISSN: 2151-9617
- Ingemar, J. Cox and Matt. L. Miller, “The First 50 Years of Electronic Watermarking”, EURASIP Journal on Applied Signal Processing, Vol.2, pp.126-132,2002.
- Ingemar, J. Cox, Matthew, L. M., Jeffrey, A. Bloom, Jassica Fridrich, Tan Kalker, “Digital Watermarking and Steganography”, Second edition, M.K. Publishers, 2008.
- B.M. Macq and J.J. Quisquater, “Cryptology for digital tvbroadcasting”, Proceeding of the IEEE, vol. 83,pp. 944- 957,June 1995.
- W. Bender .D. Gruhl. N. Mormoto, and A.Lu, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no 3, pp 313-336, 1996.
- Nino, D. Abdallah, M. Haramo, B. “Dual Domain Watermarking in the Biological Color Model”, IEEE International Conference on Information and Automation (ICIA), pp. 407-411, 15-17 Dec 2006.
- X. Wang and D. Zhao, “Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry,” Opt. Commun. 268, 240-244 (2006).
- Image Encryption Using DCT and Stream Cipher European Journal of Scientific Research ISSN 1450-216X Vol.32 No.1 (2009)
- Digital Image Watermarking ECE 533 Image Processing, University of Wisconsin-Madison Matthew Elliott and Brian Schuette December 21, 2006
Abstract Views: 857
PDF Views: 1