Browse > Article
http://dx.doi.org/10.7236/IJASC.2016.5.1.23

A study of keep the Secret information of Random Sized Images from using Indestructible Security  

Woo, Seon-mi (JINI Co., Ltd.)
Lee, Malrey (Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University)
Lee, Hyang Ran (Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, Chon Buk National University)
Publication Information
International journal of advanced smart convergence / v.5, no.1, 2016 , pp. 23-29 More about this Journal
Abstract
The information is to be considered as important part of any network, the communication nodes within network can able to communicate and transmit information by the means of configured LAN/WAN, or/and using internet technology. Thus, vast enhancement has been made in- exchanging of information over transmission media, this should be beneficial in various disciplines of modern client/server applications but at other side, several massive vulnerabilities have been directly/in-directly associated with them. To resolve the security issues, a security mechanism is proposed which hide the sensitive information of images before transmitting to networks. Random size image samples have used and encrypted to protect them from unauthorized entities. The encryption mechanism manipulates the sample images, and corresponding secret codes are generated which help to protect the images from adversaries. To provide an indestructible security mechanism, cryptography algorithms are deployed and considered as best solutions to keep the secret information of images.
Keywords
Local Area Network/Wide Area Network; Images Hiding; Security mechanisms; Secret codes; Security issues;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Panicker, O.A.; Jabeenaa, A.; Hassan Mujeebb, A., "Advanced image encryption and decryption using sandwich phase diffuser and false image along with cryptographical enhancement," Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 International Congress on , vol., no., pp.833,837, 2010, doi: 10.1109/ICUMT.2010.5676538   DOI
2 Chao-Shen Chen; Rong-Jian Chen, "Image Encryption and Decryption Using SCAN Methodology," Parallel and Distributed Computing, Applications and Technologies, 2006. PDCAT '06. Seventh International Conference on , vol., no., pp.61,66, 2006, doi: 10.1109/PDCAT.2006.71   DOI
3 R.; Johar, A.; Soni, V., "An Encryption and Decryption Algorithm for Image Based on DNA," Communication Systems and Network Technologies (CSNT), 2013 International Conference on , vol., no., pp.478,481, 2013, doi: 10.1109/CSNT.2013.105   DOI
4 Yunpeng Zhang; Fei Zuo; Zhengjun Zhai; Cai Xiaobin, "A New Image Encryption Algorithm Based on Multiple Chaos System", International Symposium on Electronic Commerce and Security, 347-350, 2008
5 M. Singh, et al., "Encryption and decryption using a sandwich phase diffuser made by using two speckle patterns and placed in the Fourier plane: Simulation results", Opt. Int. J. Light Electron. Opt. 2008doi:10.1016/j.ijleo.2008.03.025   DOI
6 Madan Singh; Arvind Kumar; Kehar Singh, "Encryption by using matrix-added, or matrix-multiplied input images placed in the input plane of a double random phase encoding geometry", Opt Laser Eng, 2009
7 Hongjuan Liu; Zhiliang Zhu; Huiyan Jiang; Beilei Wang, "A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map", The 9th International Conference for Young Computer Scientists, 3016- 3021, 2009
8 Aamir Shahzad, Kalum Priyanath Udagepola, Young-keun Lee, Soojin Park, and Malrey Lee, "The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission," International Journal of Distributed Sensor Networks, Article ID 738687..
9 K. Sakthidasan; B. V. Santhosh Krishna," A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images," International Journal of Information and Education Technology, Vol. 1, No. 2, 2011
10 Musheer Ahmad; M. Shamsher Alam, "A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping," /International Journal on Computer Science and Engineering, Vol.2 (1), 46-50, 2009
11 Ling Wang; Qun Ye; Yaoqiang Xiao et aI, "An Image Encryption Scheme Based on Cross Chaotic Map", 2008 Congress on Image and Signal Processing, 22-26, 2008
12 Xu Shu-Jiang; Wang Ying-Long; Wang Ji-Zhi; Tian Min, "A Novel mage Encryption Scheme Based on Chaotic Maps", 2008, ICSP.9th International Conference on Signal Processing, 1014-1018, 2008
13 Lu Ming-Xin; Lai Xue-Jia; Xiao Guo-Zhen; Qin Lei., "Symmetric Key Cryptosystem with DNA Technology Department of Information Management", Cancer Research Institute, Queen's University, Kingston, Canada, 2001.
14 Sherif T. Amin; Magdy Saeb; Salah El-Gindi, "A DNA-based Implementation of YAEA Encryption Algorithm, " IASTED International Conference on Computational Intelligence (CI 2006), San Francisco, 2006.
15 Shahzad, A.; Lee, M.; Lee, Y.-K.; Kim, S.; Xiong, N.; Choi, J.-Y.; Cho, Y. "Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information," Symmetry, 2015, 7, 1176-1210   DOI
16 Jui-Cheng; Jiun-In Guo, "A new chaotic key-based design for image encryption and decryption," Circuits and Systems, 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on , vol.4, no., pp.49,52 vol.4, 2000, doi: 10.1109/ISCAS.2000.858685   DOI
17 J. Fridrich, "Image Encryption Based on Chaotic Maps", IEEE International Conference on Systems, Man, and Cybernetics, Computaional Cybernetics and Simulations, pp.1105 -1110, 1997
18 Kumar, M.R.; Linslal, C.L.; Pillai, V.P.M.; Krishna, S.S., "Color image encryption and decryption based on jigsaw transform employed at the input plane of a double random phase encoding system," Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 International Congress on , vol., no., pp.860,862, 2010, doi: 10.1109/ICUMT.2010.5676474   DOI
19 Sharma; Devesh Mishra; Ankur Agarwal., "Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform," In Proceedings of the Fifth International Conference on Security of Information and Networks (SIN '12). ACM, New York, NY, USA, 153-157, 2012, doi:10.1145/2388576.2388598   DOI
20 El Sawda, R.; Al Falou, A.; Keryer, G.; Assoum, A., "Image Encryption and Decryption by Means of an Optical Phase Mask," Information and Communication Technologies, 2006. ICTTA '06. 2nd , vol.1, no., pp.1474,1477, 0-0 0, doi: 10.1109/ICTTA.2006.1684599   DOI
21 Chao-Shen Chen ;Rong-Jian Chen, "Image Encryption and Decryption Using SCAN Methodology," In Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT '06). IEEE Computer Society, Washington, DC, USA, 61-66, doi:10.1109/PDCAT.2006.71   DOI