Browse > Article
http://dx.doi.org/10.3837/tiis.2019.05.025

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image  

Mondal, Arindom (Department of Computer Science and Engineering, Khulna University of Engineering & Technology)
Alam, Kazi Md. Rokibul (Department of Computer Science and Engineering, Khulna University of Engineering & Technology)
Ali, G.G. Md. Nawaz (Department of Computer Science and Engineering, Khulna University of Engineering & Technology)
Chong, Peter Han Joo (Department of Electrical and Electronic Engineering, Auckland University of Technology)
Morimoto, Yasuhiko (Graduate School of Information Engineering, Hiroshima University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.5, 2019 , pp. 2698-2717 More about this Journal
Abstract
This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.
Keywords
Image secrecy; Multi-stage encryption; Visual Cryptography; One time pad; Steganography; Least Significant Bit;
Citations & Related Records
연도 인용수 순위
  • Reference
1 F. Hu, J. Wang, X. Xu, C. Pu and T. Peng, "Batch Image Encryption Using Generated Deep Features Based on Stacked Autoencoder Network," Mathematical Problems in Engineering, Vol. 2017, ID 3675459, pp. 1-12, 2017.
2 Z. Li, and J. Tang, "Weakly supervised deep metric learning for community-contributed image retrieval," IEEE Trans. on Multimedia, Vol. 17, No. 11, pp. 1989-1999, 2015.   DOI
3 Z. Li, and J. Tang, "Weakly supervised deep matrix factorization for social image understanding," IEEE Trans. on Image Processing, Vol. 26, No. 1, pp. 276-288, 2017.   DOI
4 P. V. Parmar, S. B. Padhar, S. N. Patel, N. I. Bhatt and R. H. Jhaveri, "Survey of Various Homomorphic Encryption algorithms and Schemes," Int. Journal of Computer Applications, Vol. 91, No. 8, 2014.
5 "MATLAB 16.0" Retrieved on January 15, 2017
6 S. S. Al-amri, N.V. Kalyankar and S. D. Khamitkar, "A Comparative Study of Removal Noise from Remote Sensing Image," Int. Journal of Computer Science, Vol. 7, Issues 1, pp. 33-36, 2010.
7 Sample images (accessed on October 05, 2017)
8 D. S. Laiphrakpam and M. S. Khumanthem, "Cryptanalysis of symmetric key image encryption using chaotic Rossler system," Elsevier, Optik, Vol. 135, pp. 200-209, 2017.   DOI
9 D. S. Laiphrakpam and M. S. Khumanthem, "A robust image encryption scheme based on chaotic system and elliptic curve over finite field," Springer, Multimedia Tools and Applications, pp. 1-24, May 2017.
10 G. Judith and N. Kumarasabapathy, "Study And Analysis of Impulse Noise Reduction Filters," An Int. Journal of Signal & Image Processing (SIPIJ), Vol. 2, No.1, March 2011.
11 S. Rohith and K. H. Bhat, "A simple robust digital image watermarking against salt and pepper noise using repetition codes," Int. Journal on Signal and Image Processing, Vol. 3, No. 1, 2012.
12 X. Wang, S. A. Okamoto, R. R. Lear and N. L. Ishigo, "Multi-stage watermarking process and system," U.S. Patent 6, 912, 294, issued June 28, 2005.
13 F. Liu, J. Tang, Y. Song, Y. Bi, and S. Yang, "Local structure based multi-phase collaborative representation for face recognition with single sample per person," Information Sciences, Vol. 346, pp.198-215, 2016.   DOI
14 F. Hu, C. Pu, H. Gao, M. Tang, and L. Li, "An image compression and encryption scheme based on deep learning," arXiv preprint arXiv:1608.05001, 2016.
15 M. Pramanik and K. Sharma, "Analysis of Visual Cryptography, Steganography Schemes and its Hybrid Approach for Security of Images," Int. Journal of Emerging Technology and Advanced Engineering (IJETAE), ISSN 2250-2459, ISO 9001:2008, Vo. 4, No. 2, February 2014.
16 M. Naor and A. Shamir, "Visual cryptography," in Proc. of Advances in Cryptology-EUROCRYPT'94, pp. 1-12, Springer Berlin/Heidelberg, 1995.
17 G. Huayong, M. Huang and Q. Wang, "Steganography and Steganalysis Based on Digital Image," in Proc. of 4th Int. Congress on Image and Signal Processing, Vol. 1, pp. 252-255, IEEE, 2011.
18 M. Paunwala and S. Patnaik, "Biometric template protection with DCT based watermarking," Machine Vision and Applications, Vol. 25, No. 1, pp. 263-275, 2014.   DOI
19 D. Aeloor and A. Manjrekar, "Securing Biometric Data with Visual Cryptography and Steganography," in Proc. of Int. Symposium on Security in Computing and Communication, pp. 330-340, Springer Berlin/Heidelberg, 2013.
20 P. Marwaha and P. Marwaha, "Visual Cryptographic Steganography in Images," in Proc. of Int. Conf. on Computing, Communication and Networking Technologies, pp. 1-6, IEEE, 2010.
21 V. Lokeswara Reddy, A. Subramanyam and P. C. Reddy, "Implementation of LSB Steganography and its Evaluation for Various File Formats," Int. Journal of Advanced Networking and Applications, Vol. c, No. 05, pp. 868-872, 2011.
22 F. Liu and C-K. Wu, "Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners," IET Information Security, Vol. 5, No. 2, pp. 121-128, 2011.   DOI
23 S. Patil and A. Kumar, "Modified One Time Pad Data Security Scheme: Random Key Generation Approach," Int. Journal of Computer and Security, Vol. 3, No. 2, 2009.
24 E. Walia and P. J. Navdeep, "An Analysis of LSB & DCT based Steganography," Global Journal of Computer Science and Technology, Vol. 10, No. 1, pp. 4-8, April 2010.
25 J. Jesalkumari and R. R. Sedamkar, "Modified Visual Cryptography Scheme for Colored Secret Image Sharing," Int. Journal of Computer Applications Technology and Research, Vol 2, No. 3, pp 350-356, 2013.   DOI
26 M. T. I. Siyam, K. M. Rokibul Alam and T. Al Jami, "An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications," IJCA, ISSN: 0975-8887, Vol. 65, No.6, March 2013.