CFP last date
20 December 2024
Reseach Article

An Overview of Image Security Techniques

by Madhu B., Ganga Holi, Srikanta Murthy K.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 6
Year of Publication: 2016
Authors: Madhu B., Ganga Holi, Srikanta Murthy K.
10.5120/ijca2016911834

Madhu B., Ganga Holi, Srikanta Murthy K. . An Overview of Image Security Techniques. International Journal of Computer Applications. 154, 6 ( Nov 2016), 37-46. DOI=10.5120/ijca2016911834

@article{ 10.5120/ijca2016911834,
author = { Madhu B., Ganga Holi, Srikanta Murthy K. },
title = { An Overview of Image Security Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 154 },
number = { 6 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 37-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number6/26499-2016911834/ },
doi = { 10.5120/ijca2016911834 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:59:33.657664+05:30
%A Madhu B.
%A Ganga Holi
%A Srikanta Murthy K.
%T An Overview of Image Security Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 6
%P 37-46
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today, the world is going to be digitalized in all the ways. Every business units, government and private sectors, research units are using the digital image as transferring mode for every critical data. These images over the internet which will not be secure. Therefore there is a need of image security. Currently, there exists various image security techniques like encryption, watermarking, steganography, etc. This paper discusses the basic image security techniques, the survey of the recent research in the field of image securities like ANN Based Approach, Genetic Algorithm Based Approach, DCT based approach, chaos-based approach, SVD based approach, Steganographic based approach, DWT based approach, visual cryptography based approach, watermarking based approach. The paper provides the future scope of image security.

References
  1. Perse, Elizabeth M., and John A. Courtright. "Normative images of communication media mass and interpersonal channels in the new media environment." Human communication research 19.4 (1993): 485-503.
  2. Calabrese, Thomas. Information security intelligence: Cryptographic principles and applications. Cengage Learning, 2004.
  3. Lam, Ieng-Fat, Kuan-Ta Chen, and Ling-Jyh Chen. "Involuntary information leakage in social network services." International Workshop on Security. Springer Berlin Heidelberg, 2008.
  4. Zhang, Bo. XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan. Diss. 2004.
  5. Hill, Douglas W., and James T. Lynn. "Adaptive system and method for responding to computer network security attacks." U.S. Patent No. 6,088,804. 11 Jul. 2000.
  6. Kaufman, Charlie, Radia Perlman, and Mike Speciner. Network security: private communication in a public world. Prentice Hall Press, 2002.
  7. Spanos, George Anastasios, and Tracy Bradley Maples. "Performance study of a selective encryption scheme for the security of networked, real-time video." Computer Communications and Networks, 1995. Proceedings., Fourth International Conference on. IEEE, 1995.
  8. Alfalou, Ayman, and C. Brosseau. "Optical image compression and encryption methods." Advances in Optics and Photonics 1.3 (2009): 589-636.
  9. Kenneth H Rosen. Cryptography: theory and practice. CRC press, 2005.
  10. Denning, Dorothy E. "Cryptography and data security." (1982).
  11. Anil C. Suthar1, Chiragkumar B. Patel2, and Gopal R. Kulkarni3, “Simulation and implementation novel hybrid blind method of image security. InCommunication and Computing (ARTCom2012), Fourth International Conference on Advances in Recent Technologies, pp. 202-205, 2012
  12. S. B-Solorio, C.T. Li, & A.K. Nandi, “Watermarking method with exact self-propagating restoration capabilities”, In IEEE International Workshop on Information Forensics and Security (WIFS), pp. 217-222, 2012
  13. A. Abusukhon, and M. Talib, “A Novel network security algorithm based on Private Key Encryption. In Cyber Security”, Cyber Warfare and Digital Forensic (CyberSec), International Conference, pp. 33-37, 2012
  14. D. Fu, X. Yu, & T.Wang, “Segmentation algorithm study for infrared images with occluded target based on artificial immune system”, In Computational Intelligence and Security (CIS), Eighth International Conference on (pp. 350-353, 2012
  15. S.K. Singh, V.P. Gopi, and P. Palanisamy, “Image security using DES and RNS with reversible watermarking”, In Electronics and Communication Systems (ICECS), International Conference, pp. 1-5, 2014.
  16. T. Gupta, V. Sainath, C. Naveen, V. R. Satpute, and A. S. Gandhi, “Image security using chaos and EZW compression”, In Engineering and Systems (SCES), Students Conference, pp. 1-6, 2014.
  17. X. Yanyan, Z. Yuxia, and X. Zhengquan, “An Active-Passive Security Protection Method for Remote Sensing Image”, In Network Computing and Information Security (NCIS), International Conference on (Vol. 1, pp. 30-34), 2011
  18. A.K. Mohan, M.R. Saranya, & K. Anusudha, :An algorithm for enhanced image security with reversible data hiding. InContemporary Computing and Informatics (IC3I), 2014 International Conference, (pp. 1042-1045), 2014
  19. E.Z. Zefreh, S. Rajaee, S. and M. Farivary, “Image security system using recursive Cellular automata substitution and its parallelization”, In Computer Science and Software Engineering (CSSE), 2011 CSI International Symposium, (pp. 77-86), 2011
  20. C. Naveen, T. V. S. Gupta, V. R. Satpute, and A. S. Gandhi, "A simple and efficient approach for medical image security using chaos on EZW", In Advances in Pattern Recognition (ICAPR), 2015 Eighth International Conference, pp. 1-6, 2015.
  21. A. Pandey, and S. Srivastava, "An approach for virtual machine image security", In Signal Propagation and Computer Technology (ICSPCT), 2014 International Conference, pp. 616-623. IEEE, 2014.
  22. A. Mitra, "Investigating scopes for automata based designs targeting image security in health system," E-Health and Bioengineering Conference (EHB), pp. 1-4, 2015.
  23. S. Shefali and S. M. Deshapande, "Self embedding technique for digital color image authentication and security," 2007 International Conference on Industrial and Information Systems, Penadeniya, pp. 147-152, 2007
  24. A. Umamageswari, G.R.Suresh, “Security in Medical Image Communication with Arnold's Cat map method and Reversible Wa term arking”, International Conference on Circuits, Power and Computing Technologies, 2013
  25. V.V. Nabıyev, M. Ulutaş, and G. Ulutaş, “Secret Sharing Scheme to implement medical image security”, In 2010 IEEE 18th Signal Processing and Communications Applications Conference, pp. 820-823, 2010.
  26. B. Priego, D. Souto, F. L. Peña, and R. J. Duro, "An ANN based hyperspectral waterway control and security system", In 2011 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA) Proceedings, pp. 1-6, 2011
  27. P.V.V. Kishore, K. S. Prajwal, M. K. Mohan, and S. Koteswarao, “Medical image watermarking with ANN in wavelet domain”, In Electronics, Computing and Communication Technologies (CONECCT), 2015 IEEE International Conference, pp. 1-6, 2015.
  28. N.K. Pareek, and V. Patidar, “Medical image protection using genetic algorithm operations”, Soft Computing, Vol. 20(2), pp.763-772, 2016.
  29. H.R. Kanan, and B. Nazeri, "A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm", Expert Systems with Applications, Vol. 41, No. 14, pp. 6123-6130, 2014
  30. Y-R. Li, L. Shen, and B.W. Suter, “Adaptive inpainting algorithm based on DCT induced wavelet regularization”, IEEE Transactions on Image Processing, Vol. 22, No. 2, pp.752-763, 2013.
  31. M.A. Saad, A. C. Bovik, and C. Charrier, “Blind image quality assessment: A natural scene statistics approach in the DCT domain”, IEEE Transactions on Image Processing, Vol. 21, No. 8 pp.3339-3352, 2012.
  32. X. Wang, and Q. Wang, “A novel image encryption algorithm based on dynamic S-boxes constructed by chaos”, Nonlinear Dynamics, Vol. 75, No. 3, pp.567-576, 2014
  33. R. Enayatifar, A. H. Abdullah, and I. F. Isnin, “Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence”, Optics and Lasers in Engineering, Vol. 56, pp. 83-93, 2014.
  34. W. Liu, Wei, and Weisi Lin. "Additive white Gaussian noise level estimation in SVD domain for images." IEEE Transactions on Image Processing 22, no. 3 (2013): 872-883.
  35. A.K. Bhandari, V. Soni, A. Kumar, and G. K. Singh, "Cuckoo search algorithm based satellite image contrast and brightness enhancement using DWT–SVD", ISA transactions, Vol. 53, No. 4, pp.1286-1296, 2014
  36. Fridrich, Jessica, and Jan Kodovsky. "Rich models for steganalysis of digital images." IEEE Transactions on Information Forensics and Security 7, no. 3 (2012): 868-882.
  37. B. Feng, W. Lu, and W. Sun, “Secure binary image steganography based on minimizing the distortion on the texture”, IEEE transactions on Information Forensics and Security, Vol. 10, No. 2, pp.243-255, 2015.
  38. N. Askari, H. M. Heys, and C. R. Moloney,"An extended visual cryptography scheme without pixel expansion for halftone images", In Electrical and Computer Engineering (CCECE), 2013 26th Annual IEEE Canadian Conference, pp. 1-6, 2013.
  39. N. Askari, H.M. Heys, and C.R. Moloney,”An Extended visual Cryptogrpahy Scheme without pixel expansion for halftone images” IEEE 2013
  40. Wang, and H. Li, “A Novel Scrambling Digital Image Watermark Algorithm Based on Double Transform Domains”, Mathematical Problems in Engineering, 2015.
  41. H. Sadreazami, M. O. Ahmad, and M. N. S. Swamy, “A study of multiplicative watermark detection in the contourlet domain using alpha-stable distributions”, IEEE Transactions on Image Processing, Vol. 23, No. 10, pp. 4348-4360, 2014
  42. J. Baviskar, A. Mulla, N. Kudu, A. Parthsarathy, and A. Baviskar, “Sub-band exchange DWT based image fusion algorithm for enhanced security”, In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference, pp. 534-539, 2014.
  43. A. Mulla, J. Baviskar, S. Wagh, N. Kudu, and A. Baviskar, “Probabilistic triangular shuffling approach in DWT based image compression scheme”, In Communication, Information & Computing Technology (ICCICT), International Conference, pp. 1-6,2015.
Index Terms

Computer Science
Information Sciences

Keywords

ANN Chaos method DCT Digital signature DWT Genetic algorithm Image Processing Image security.