CFP last date
20 December 2024
Reseach Article

Image Encryption in Transform Domain using Circular Shift

by Tanuja Sarode, Devishree Pillai, Shalmalee Pokale, Tejashri Prabhu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 140 - Number 11
Year of Publication: 2016
Authors: Tanuja Sarode, Devishree Pillai, Shalmalee Pokale, Tejashri Prabhu
10.5120/ijca2016909493

Tanuja Sarode, Devishree Pillai, Shalmalee Pokale, Tejashri Prabhu . Image Encryption in Transform Domain using Circular Shift. International Journal of Computer Applications. 140, 11 ( April 2016), 19-23. DOI=10.5120/ijca2016909493

@article{ 10.5120/ijca2016909493,
author = { Tanuja Sarode, Devishree Pillai, Shalmalee Pokale, Tejashri Prabhu },
title = { Image Encryption in Transform Domain using Circular Shift },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 140 },
number = { 11 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume140/number11/24639-2016909493/ },
doi = { 10.5120/ijca2016909493 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:42:13.812409+05:30
%A Tanuja Sarode
%A Devishree Pillai
%A Shalmalee Pokale
%A Tejashri Prabhu
%T Image Encryption in Transform Domain using Circular Shift
%J International Journal of Computer Applications
%@ 0975-8887
%V 140
%N 11
%P 19-23
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the advent of cloud storage and increase in transmission images through internet, images are more vulnerable to attacks of various hackers. A lot of private images are leaked from the cloud. Information security has become a major concern. Also, as the use of digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. Encrypting the images is one way of dealing with this threat. Image encryption techniques try to convert original image to another image which is hard to decipher so that the image is kept confidential between users, in other words, it is essential that nobody will get to know the content without a key for decryption. This paper proposes a new approach to image encryption using circular shift in transform domain.

References
  1. John Justin M, Manimurugan S., “A Survey on Various Encryption Techniques”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012.
  2. Rinki Pakshwar, Vijay K. Trivedi, Vineet Richhariya, “ A Survey on Different Image Encryption and Decryption Techniques”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 4 (1), 2013, 113 – 116
  3. Nicholas J. Daras, Michael Th. Rassias Computation, Cryptography, and Network Security Springer, 16-Sep-2015
  4. H. B. Kekre, Tanuja Sarode, Pallavi N. Halarnkar & Debkanya Mazumder, “Comparative Performance of Image Scrambling in Transform Domain using Sinusoidal Transforms”, International Journal of Image Processing (IJIP), Vol. 9, issue 2, 2014.
  5. Tai-hoon Kim, Hojjat Adeli, Carlos Ramos, Byeong-Ho Kang Springer, “Signal Processing, Image Processing and Pattern Recognition: International Conferences, SIP 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings”,  02-Dec-2011
  6. Mintu Philip, “An Enhanced Chaotic Image Encryption”, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, Dec 2011
  7. Hala Bahjat, May A.Salih, “Dynamic Shuffling for Speed Image Encryption”, International Journal of Computer Applications (0975-8887), Vol. 89, No. 7, March 2014
  8. Sowmyashree, R.R. Sedamkar, “A Hybrid Approach for Secure Data Communication using Reversible Data Hiding and Image Encryption”, International Journal of Current Engineering and Technology, Vol. 4, No. 6, Dec 2014
  9. Dr. H.B. Kekre, Sudeep D. Thepade, Tanuja K. Sarode, Vashali Suryawanshi, “Image Retrieval using Texture Features extracted from GLCM, LBG, KPE”, International Journal of Computer Theory and Engineering, Vol. 2, No. 5, October 2010, 1793-8201.
  10. Yue Wu, Yicong Zhou, George Saveriades, Sos Agaian, Joseph P. Noonan, Premkumar Natrajan, “Local Shannon entropy measure with statistical tests for image randomness”, Information Sciences, Vol. 222, February 10, 2013, Pages 323-342.
Index Terms

Computer Science
Information Sciences

Keywords

Circular shift Discrete Cosine Transform