CFP last date
20 January 2025
Reseach Article

Analysis of Pixel Merging for Multi Image Integration for Security Enhancement

by A. D. Senthil Kumar, T. S. Anandhi, Ranganath Muthu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 4
Year of Publication: 2017
Authors: A. D. Senthil Kumar, T. S. Anandhi, Ranganath Muthu
10.5120/ijca2017915915

A. D. Senthil Kumar, T. S. Anandhi, Ranganath Muthu . Analysis of Pixel Merging for Multi Image Integration for Security Enhancement. International Journal of Computer Applications. 179, 4 ( Dec 2017), 6-11. DOI=10.5120/ijca2017915915

@article{ 10.5120/ijca2017915915,
author = { A. D. Senthil Kumar, T. S. Anandhi, Ranganath Muthu },
title = { Analysis of Pixel Merging for Multi Image Integration for Security Enhancement },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2017 },
volume = { 179 },
number = { 4 },
month = { Dec },
year = { 2017 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number4/28722-2017915915/ },
doi = { 10.5120/ijca2017915915 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:54:24.504929+05:30
%A A. D. Senthil Kumar
%A T. S. Anandhi
%A Ranganath Muthu
%T Analysis of Pixel Merging for Multi Image Integration for Security Enhancement
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 4
%P 6-11
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper focus on image security based on compressing the image with encryption and pixel integration. This process involves applying Joint Photographic Experts Group compression for RGB layers, encrypting the images with Elliptic Curve Encryption Algorithm and block based interleaving followed by pixel based integration technique. With the key specifically generated for the image, the original image is decrypted from multiple images. This method is useful when access permissions needs to be restricted to certain viewers. The proposed method provides a high-level security in the fields of aerospace, national security, military, financial and economic, and so on. Performance is evaluated by calculating the correlation coefficient and entropy values.

References
  1. Christof Paar and Jan Pelzl,” Understanding Cryptography: A Textbook for Students and Practitioners," Springer, 2010,pp.1-24
  2. Joan Daemen and Vincent Rijmen,"The Design of Rijndael: AES - The Advanced Encryption Standard,” Ist edition, New York: Spinger,2002, pp.1-29
  3. Chris Solomon and Toby Breckon,"Fundamentals of Digital Image Processing,” Wiley,2010, pp1-18
  4. I. Ozturk and I. Sogukpinar,"Analysis and comparison of image encryption algorithm,”Journal of transactions on engineering, computing and technology, pp.38, Dec 2004.
  5. Li. Shujun and X. Zheng,"Cryptanalysis of a chaotic image encryption method,"IEEE International Symposium on Circuits and Systems, ISCAS, May 2002.
  6. Rinki Pakshwar, Vijay Kumar Trivedi and Vineet Richhariya,"A Survey On Different Image Encryption and Decryption Techniques," International Journal of Computer Science and Information Technologies, pp.113-116, April 2013.
  7. Mohammad Ali Bani Younes and Aman Janta,"Image Encryption Using Block-Based Transformation Algorithm,"IAENG International Journal of Computer, Feb 2008.
  8. Ahmed Bashir Abugharsa, Abd Samad Bin Hasan Basari and Hamida Almangush,"A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm," International Journal of Computer Applications, pp.38-45, March 2012.
  9. A. Mitra, Y V. Subba Rao, and S. R. M. Prasnna,“A new image encryption approach using combinational permutation techniques," Journal of Computer Sciece, pp.127, Feb 2006.
  10. Hanpinitsak and C. Charoenlarpnopparut,"2D Interleaver Design for Image Transmission over Severe Burst-Error Environment," International Journal of Future Computer and Communication, pp.308-312, Aug 2013.
  11. Shengyong Guan, Fuqiang Yao and Chang Wen Chen,"A novel interleaver for image communications with theoretical analysis of characteristics," Communications, Circuits and Systems and West Sino Expositions,IEEE 2002 International Conference (Volume:1), July 2002.
  12. B.Subramanyan, V.M.Chhabria and T.G.S.Babu,"Image Encryption Based on AES Key Expansion," Emerging Applications of Information Technology (EAIT), 2011 Second International Conference, Feb 2011.
  13. Rogelio Hasimoto-Beltran and Ashfaq Khichari,"Pixel Level Interleaving scheme for Robust Image Communication," Scalable and Parallel Algorithm Labs, University of Delaware, Newark, Oct 1998.
  14. Aloka Sinha and Kehar Singh,“Image encryption using fractional Fourier transform and 3D Jigsaw transform,"Department of Physics, Indian Institute of Technology Delhi, New Delhi-110016,India,Dec 2004.
  15. Frank Dellaert and Robert Collins, "Fast Image-Based Tracking by Selective Pixel Integration,"Computer Science Department and Robotics Institute Carnegie Mellon University,Pittsburgh,Sep 1999
  16. Norman D. Jorstad, "Cryptographic Algorithm Metrics,"Institute for Defense Analyses Science and Technology Division-Jan 1997.
  17. Satoru Yoneyama and Go Murasawa, "Digital Image Correlation," Encyclopedia of Life Support Systems, Digit Imaging. 2008 Sep.
  18. Du-Yih Tsai, Yongbum Lee and Eri Matsuyama,“Information Entropy Measure for Evaluation of Image Quality", Sep 2008.
  19. G.Zhi-Hong, H.Fangjun, and G.Wenjie, "Chaos-base, Image Encryption Algorithm,”Elsevier, pp. 153-157, Oct 2005.
  20. NIST (National Institute of Standards and Technology) Special Publication 800-57,May 2006
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Pixel Integration Elliptic Curve Encryption Algorithm Digital Communication Image Interleaving Image Processing