• 제목/요약/키워드: Image cryptography

검색결과 65건 처리시간 0.024초

FPGA Implementation of LSB-Based Steganography

  • Vinh, Quang Do;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • 제15권3호
    • /
    • pp.151-159
    • /
    • 2017
  • Steganography, which is popular as an image processing technology, is the art of using digital images to hide a secret message in such a way that its existence can only be discovered by the sender and the intended receiver. This technique has the advantage of concealing secret information in a cover medium without drawing attention to it, unlike cryptography, which tries to convert data into something messy or meaningless. In this paper, we propose two efficient least significant bit (LSB)-based steganography techniques for designing an image-based steganography system on chip using hardware description language (HDL). The proposed techniques manipulate the LSB plane of the cover image to embed text inside it. The output of these algorithms is a stego-image which has the same quality as that of the original image. We also implement the proposed techniques using the Altera field programmable gate array (FPGA) and Quartus II design software.

1차원 FN-MLCA와 3차원 카오틱 캣 맵 기반의 컬러 이미지 암호화 (1D FN-MLCA and 3D Chaotic Cat Map Based Color Image Encryption)

  • 최언숙
    • 한국멀티미디어학회논문지
    • /
    • 제24권3호
    • /
    • pp.406-415
    • /
    • 2021
  • The worldwide spread of the Internet and the digital information revolution have resulted in a rapid increase in the use and transmission of multimedia information due to the rapid development of communication technologies. It is important to protect images in order to prevent problems such as piracy and illegal distribution. To solve this problem, I propose a new digital color image encryption algorithm in this paper. I design a new pseudo-random number generator based on 1D five-neighborhood maximum length cellular automata (FN-MLCA) to change the pixel values of the plain image into unpredictable values. And then I use a 3D chaotic cat map to effectively shuffle the positions of the image pixel. In this paper, I propose a method to construct a new MLCA by modeling 1D FN-MLCA. This result is an extension of 1D 3-neighborhood CA and shows that more 1D MLCAs can be synthesized. The safety of the proposed algorithm is verified through various statistical analyses.

A Novel DWT-SVD Canny-Based Watermarking Using a Modified Torus Technique

  • Lalani, Salima;Doye, D.D.
    • Journal of Information Processing Systems
    • /
    • 제12권4호
    • /
    • pp.681-687
    • /
    • 2016
  • Today's modern world requires a digital watermarking technique that takes the redundancy of an image into consideration for embedding a watermark. The novel algorithm used in this paper takes into consideration the redundancies of spatial domain and wavelet domain for embedding a watermark. Also, the cryptography-based secret key makes the algorithm difficult to hack and help protect ownership. Watermarking is blind, as it does not require the original image. Few coefficient matrices and secret keys are essential to retrieve the original watermark, which makes it redundant to various intentional attacks. The proposed technique resolves the challenge of optimizing transparency and robustness using a Canny-based edge detector technique. Improvements in the transparency of the cover image can be seen in the computed PSNR value, which is 44.20 dB.

A novel framework for the construction of cryptographically secure S-boxes

  • Razi Arshad;Mudassir Jalil;Muzamal Hussain;Abdelouahed Tounsi
    • Computers and Concrete
    • /
    • 제34권1호
    • /
    • pp.79-91
    • /
    • 2024
  • In symmetric cryptography, a cryptographically secure Substitution-Box (S-Box) is a key component of a block cipher. S-Box adds a confusion layer in block ciphers that provide resistance against well-known attacks. The generation of a cryptographically secure S-Box depends upon its generation mechanism. In this paper, we propose a novel framework for the construction of cryptographically secure S-Boxes. This framework uses a combination of linear fractional transformation and permutation functions. S-Boxes security is analyzed against well-known security criteria that include nonlinearity, bijectiveness, strict avalanche and bits independence criteria, linear and differential approximation probability. The S-Boxes can be used in the encryption of any grayscale digital images. The encrypted images are analyzed against well-known image analysis criteria that include pixel changing rates, correlation, entropy, and average change of intensity. The analysis of the encrypted image shows that our image encryption scheme is secure.

Efficient Compression Schemes for Double Random Phase-encoded Data for Image Authentication

  • Gholami, Samaneh;Jaferzadeh, Keyvan;Shin, Seokjoo;Moon, Inkyu
    • Current Optics and Photonics
    • /
    • 제3권5호
    • /
    • pp.390-400
    • /
    • 2019
  • Encrypted images obtained through double random phase-encoding (DRPE) occupy considerable storage space. We propose efficient compression schemes to reduce the size of the encrypted data. In the proposed schemes, two state-of-art compression methods of JPEG and JP2K are applied to the quantized encrypted phase images obtained by combining the DRPE algorithm with the virtual photon counting imaging technique. We compute the nonlinear cross-correlation between the registered reference images and the compressed input images to verify the performance of the compression of double random phase-encoded images. We show quantitatively through experiments that considerable compression of the encrypted image data can be achieved while security and authentication factors are completely preserved.

Enhancing Data Protection in Digital Communication: A Novel Method of Combining Steganography and Encryption

  • Khaled H. Abuhmaidan;Marwan A. Al-Share;Abdallah M. Abualkishik;Ahmad Kayed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권6호
    • /
    • pp.1619-1637
    • /
    • 2024
  • In today's highly digitized landscape, securing digital communication is paramount due to threats like hacking, unauthorized data access, and network policy violations. The response to these challenges has been the development of cryptography applications, though many existing techniques face issues of complexity, efficiency, and limitations. Notably, sophisticated intruders can easily discern encrypted data during transmission, casting doubt on overall security. In contrast to encryption, steganography offers the unique advantage of concealing data without easy detection, although it, too, grapples with challenges. The primary hurdles in image steganography revolve around the quality and payload capacity of the cover image, which are persistently compromised. This article introduces a pioneering approach that integrates image steganography and encryption, presenting the BitPatternStego method. This novel technique addresses prevalent issues in image steganography, such as stego-image quality and payload, by concealing secret data within image pixels with identical bit patterns as their characters. Consequently, concerns regarding the quality and payload capacity of steganographic images become obsolete. Moreover, the BitPatternStego method boasts the capability to generate millions of keys for the same secret message, offering a robust and versatile solution to the evolving landscape of digital security challenges.

Optical Scanning Holography - A Review of Recent Progress

  • Poon, Ting-Chung
    • Journal of the Optical Society of Korea
    • /
    • 제13권4호
    • /
    • pp.406-415
    • /
    • 2009
  • Optical scanning holography (OSH) is a distinct digital holographic technique in that real-time holographic recording a three-dimensional (3-D) object can be acquired by using two-dimensional active optical heterodyne scanning. Applications of the technique so far have included optical scanning cryptography, optical scanning microscopy, 3-D pattern recognition, 3-D holographic TV, and 3-D optical remote sensing. This paper reviews some of the recent progress in OSH. Some possible further works are also discussed.

Signal-Dependent Chaotic-State-Modulated Digital Secure Communication

  • Farooq, Omar;Datta, Sekharjit
    • ETRI Journal
    • /
    • 제28권2호
    • /
    • pp.250-252
    • /
    • 2006
  • In this letter, a discrete state, discrete time chaotic pseudo random number generator (CPRNG) is presented for stream ciphering of text, audio, or image data. The CPRNG is treated as a finite state machine, and its state is modulated according to the input bit sequence of the signal to be encrypted. The modulated state sequence obtained can be transmitted as a spread spectrum or encrypted data.

  • PDF

실시간 데이터 전송 환경에서의 셀룰러 오토마타 기반의 ROI 이미지 암호 알고리즘 (A ROI Image Encryption Algorithm Based on Cellular Automata in Real-Time Data Transmission Environment)

  • 최언숙
    • 한국전자통신학회논문지
    • /
    • 제18권6호
    • /
    • pp.1117-1124
    • /
    • 2023
  • 이미지 콘텐츠를 포함한 정보의 보안은 오늘날 통신 기술의 필수적인 부분이며 보안 전송에 매우 중요하다. 본 논문에서는 신분증 등 민감한 정보가 포함된 이미지에 대해 실시간 데이터 전송이 필요한 환경에 적합한 보안 수준으로 신속하게 이미지를 암호화할 수 있는 암호화 알고리즘을 제안한다. 제안되는 알고리즘은 하드웨어 구현이 가능하고, 하드웨어 친화적 연산이 가능한 1차원 5-이웃 셀룰러 오토마타를 기반으로 한 알고리즘이다. 제안된 암호 알고리즘에 대하여 다양한 실험과 분석을 수행하여 다양한 무차별 대입 공격으로부터 안전함을 검증한다.

의료영상 보안을 위한 워터마크 인증 암호화 기법 (Watermark Authentication Cryptography for Medical Image Security)

  • 조영복;우성희;이상호
    • 한국정보통신학회논문지
    • /
    • 제21권4호
    • /
    • pp.759-766
    • /
    • 2017
  • 제안 논문에서는 의료영상의 다양한 공격에 안전하고 견고하도록 의료 영상을 일정기간 압축 저장해 디지털 콘텐츠에 투명성을 유지한다. 제안논문은 오리지널 영상의 특징 값을 추출하고 사용자의 정보와 결합해서 암호화된 영상 인증코드를 생성한다. 인증코드는 은닉된 데이터를 추출하기 위해 먼저 암호화된 의료영상을 복호화하고 영상의 공간 특성을 이용해 은닉데이터를 추출한다. 따라서 워터마킹을 통해 콘텐츠 자체에 직접 삽입 후 영상의 인증을 위해 추출된 인증코드와 새로 생성된 인증코드의 비교를 수행해 무결성을 보장하고 영상자료의 다양한 공격 안전함을 증명하고 인증률도 98.4%로 향상됨을 증명하였다.