DOI QR코드

DOI QR Code

A study of keep the Secret information of Random Sized Images from using Indestructible Security

  • Woo, Seon-mi (JINI Co., Ltd.) ;
  • Lee, Malrey (Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University) ;
  • Lee, Hyang Ran (Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University)
  • 투고 : 2015.11.13
  • 심사 : 2016.01.15
  • 발행 : 2016.03.31

초록

The information is to be considered as important part of any network, the communication nodes within network can able to communicate and transmit information by the means of configured LAN/WAN, or/and using internet technology. Thus, vast enhancement has been made in- exchanging of information over transmission media, this should be beneficial in various disciplines of modern client/server applications but at other side, several massive vulnerabilities have been directly/in-directly associated with them. To resolve the security issues, a security mechanism is proposed which hide the sensitive information of images before transmitting to networks. Random size image samples have used and encrypted to protect them from unauthorized entities. The encryption mechanism manipulates the sample images, and corresponding secret codes are generated which help to protect the images from adversaries. To provide an indestructible security mechanism, cryptography algorithms are deployed and considered as best solutions to keep the secret information of images.

키워드

참고문헌

  1. Panicker, O.A.; Jabeenaa, A.; Hassan Mujeebb, A., "Advanced image encryption and decryption using sandwich phase diffuser and false image along with cryptographical enhancement," Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 International Congress on , vol., no., pp.833,837, 2010, doi: 10.1109/ICUMT.2010.5676538
  2. Chao-Shen Chen; Rong-Jian Chen, "Image Encryption and Decryption Using SCAN Methodology," Parallel and Distributed Computing, Applications and Technologies, 2006. PDCAT '06. Seventh International Conference on , vol., no., pp.61,66, 2006, doi: 10.1109/PDCAT.2006.71
  3. R.; Johar, A.; Soni, V., "An Encryption and Decryption Algorithm for Image Based on DNA," Communication Systems and Network Technologies (CSNT), 2013 International Conference on , vol., no., pp.478,481, 2013, doi: 10.1109/CSNT.2013.105
  4. Yunpeng Zhang; Fei Zuo; Zhengjun Zhai; Cai Xiaobin, "A New Image Encryption Algorithm Based on Multiple Chaos System", International Symposium on Electronic Commerce and Security, 347-350, 2008
  5. M. Singh, et al., "Encryption and decryption using a sandwich phase diffuser made by using two speckle patterns and placed in the Fourier plane: Simulation results", Opt. Int. J. Light Electron. Opt. 2008doi:10.1016/j.ijleo.2008.03.025
  6. Madan Singh; Arvind Kumar; Kehar Singh, "Encryption by using matrix-added, or matrix-multiplied input images placed in the input plane of a double random phase encoding geometry", Opt Laser Eng, 2009
  7. Hongjuan Liu; Zhiliang Zhu; Huiyan Jiang; Beilei Wang, "A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map", The 9th International Conference for Young Computer Scientists, 3016- 3021, 2009
  8. Aamir Shahzad, Kalum Priyanath Udagepola, Young-keun Lee, Soojin Park, and Malrey Lee, "The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission," International Journal of Distributed Sensor Networks, Article ID 738687..
  9. K. Sakthidasan; B. V. Santhosh Krishna," A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images," International Journal of Information and Education Technology, Vol. 1, No. 2, 2011
  10. Musheer Ahmad; M. Shamsher Alam, "A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping," /International Journal on Computer Science and Engineering, Vol.2 (1), 46-50, 2009
  11. Ling Wang; Qun Ye; Yaoqiang Xiao et aI, "An Image Encryption Scheme Based on Cross Chaotic Map", 2008 Congress on Image and Signal Processing, 22-26, 2008
  12. Xu Shu-Jiang; Wang Ying-Long; Wang Ji-Zhi; Tian Min, "A Novel mage Encryption Scheme Based on Chaotic Maps", 2008, ICSP.9th International Conference on Signal Processing, 1014-1018, 2008
  13. Lu Ming-Xin; Lai Xue-Jia; Xiao Guo-Zhen; Qin Lei., "Symmetric Key Cryptosystem with DNA Technology Department of Information Management", Cancer Research Institute, Queen's University, Kingston, Canada, 2001.
  14. Sherif T. Amin; Magdy Saeb; Salah El-Gindi, "A DNA-based Implementation of YAEA Encryption Algorithm, " IASTED International Conference on Computational Intelligence (CI 2006), San Francisco, 2006.
  15. Jui-Cheng; Jiun-In Guo, "A new chaotic key-based design for image encryption and decryption," Circuits and Systems, 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on , vol.4, no., pp.49,52 vol.4, 2000, doi: 10.1109/ISCAS.2000.858685
  16. J. Fridrich, "Image Encryption Based on Chaotic Maps", IEEE International Conference on Systems, Man, and Cybernetics, Computaional Cybernetics and Simulations, pp.1105 -1110, 1997
  17. Kumar, M.R.; Linslal, C.L.; Pillai, V.P.M.; Krishna, S.S., "Color image encryption and decryption based on jigsaw transform employed at the input plane of a double random phase encoding system," Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 International Congress on , vol., no., pp.860,862, 2010, doi: 10.1109/ICUMT.2010.5676474
  18. Shahzad, A.; Lee, M.; Lee, Y.-K.; Kim, S.; Xiong, N.; Choi, J.-Y.; Cho, Y. "Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information," Symmetry, 2015, 7, 1176-1210 https://doi.org/10.3390/sym7031176
  19. Sharma; Devesh Mishra; Ankur Agarwal., "Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform," In Proceedings of the Fifth International Conference on Security of Information and Networks (SIN '12). ACM, New York, NY, USA, 153-157, 2012, doi:10.1145/2388576.2388598
  20. El Sawda, R.; Al Falou, A.; Keryer, G.; Assoum, A., "Image Encryption and Decryption by Means of an Optical Phase Mask," Information and Communication Technologies, 2006. ICTTA '06. 2nd , vol.1, no., pp.1474,1477, 0-0 0, doi: 10.1109/ICTTA.2006.1684599
  21. Chao-Shen Chen ;Rong-Jian Chen, "Image Encryption and Decryption Using SCAN Methodology," In Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT '06). IEEE Computer Society, Washington, DC, USA, 61-66, doi:10.1109/PDCAT.2006.71