CFP last date
20 December 2024
Reseach Article

A Study of Image Compression and SHA 256 Encryption Algorithms for Secure Transmission

by S. Gopinathan, M. Suganthi Vinoj
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 37
Year of Publication: 2019
Authors: S. Gopinathan, M. Suganthi Vinoj
10.5120/ijca2019918316

S. Gopinathan, M. Suganthi Vinoj . A Study of Image Compression and SHA 256 Encryption Algorithms for Secure Transmission. International Journal of Computer Applications. 181, 37 ( Jan 2019), 9-12. DOI=10.5120/ijca2019918316

@article{ 10.5120/ijca2019918316,
author = { S. Gopinathan, M. Suganthi Vinoj },
title = { A Study of Image Compression and SHA 256 Encryption Algorithms for Secure Transmission },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2019 },
volume = { 181 },
number = { 37 },
month = { Jan },
year = { 2019 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number37/30272-2019918316/ },
doi = { 10.5120/ijca2019918316 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:08:23.251720+05:30
%A S. Gopinathan
%A M. Suganthi Vinoj
%T A Study of Image Compression and SHA 256 Encryption Algorithms for Secure Transmission
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 37
%P 9-12
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposed an integrated image compression and encryption technique using similiar to color cell compression techniques with Secure Hash Algorithm 256 .The purpose of image compression is to represent images with less data in order to save storage costs or transmission time with secure. Digital images, which covers the high percentage of the multimedia data, its protection is very important. It designed a lossy compression that exploits the pixel redundancy and visual imperceptibility of human eye to fine details in the digital image. This can be achieved by image Compression process, to reduce the pixel and visual redundancy, adjacent pixels can be used to only stores RGB colour information in each pixel continuously .For encryption ,using secure hash functions the bit length of the digest they produce 256 bit message for the purpose of security for transmitting digital image.

References
  1. Musheer Ahmad , M.N. Doja , M.M. Sufyan Beg , Security analysis and enhancements of an image cryptosystem based on hyperchaotic system,in press .pp 1-8.
  2. Sattar Mirzakuchaki, Reza Ebrahimi Atani, A Novel Image Encryption Algorithm Based onHash Function. 2010 IEEE. 978-982.
  3. Sergey Krivenko,Nikolay Ponomarenko, : A Comprehensive Study of Lossy Compression of Noisy Images Based on Visual Quality ISSN 1687-6180.
  4. Gong, Lihua; Deng, Chengzhi; Pan, Shumin; Zhou, Nanrun: Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform, Optics and Laser Technology, Volume 103, p. 48-58.
  5. Adem Orsdemir, H. Oktay Altun, Gaurav Sharma, Mark F. Bocko: on the security and robustness of encryption via compressed sensing, IEEE Print ISBN: 978-1-4244-2676-8, Print ISSN: 2155-7578.
  6. Aidi Zhang , Nanrun Zhou: Color Image Encryption Algorithm Combining Compressive Sensing with Arnold Transform, JOURNAL OF COMPUTERS, VOL. 8, NO. 11 PP no-2857-2862.
  7. Rong Huang, Kouichi Sakurai: A Robust and Compression-combined Digital Image Encryption Method Based on Compressive Sensing, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing pp.no 105-108.
  8. D. Venugopal , M.Gunasekaran , A.Sivanatharaja : Secured Color Image Compression and Efficient Reconstruction Using Arnold Transform with Chaos Encoding Technique, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4 P.169-174.
  9. Hiral Rathod, Mahendra Singh Sisodia, Sanjay Kumar Sharma: Design and Implementation of Image Encryption Algorithm by using Block Based Symmetric Transformation Algorithm, IJCTEE Volume 1, Issue 3 p-no 7-11.
  10. Xiaodong Li , Cailan Zhou , Ning Xu. A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos, International Journal of Network Security, Vol.20, No.1, PP.110-120.
  11. Shubo Liu, Jing Sun , Zhengquan Xu , Jin Liu: Analysis on an Image Encryption Algorithm, International Workshop on Education Technology and Training.
  12. Guodong Ye and Xiaoling Huang: A secure image encryption algorithm based on chaotic maps and SHA-3, Security Comm. Networks 2016; 9:2015–2023 © 2016 John Wiley & Sons, Ltd.
  13. Xingyuan Wanga , Siwei Wanga , Yingqian Zhang ,Chao Luo : A one-time pad color image cryptosystem based on SHA-3 and multiple chaotic systems. Optics and Lasers in Engineering 103 p.no 1–8. R. C. Gonzalea and R. E. Woods, "Digital Image Processing", 2nd Ed., Prentice Hall, 2004.
  14. W.Black ,An introduction to digital image processing ,Strandberg Publishing Company Birkeroed,Denmark,Denmark ,1985.
  15. https://www.mathworks.com/matlabcentral/fileexchange/4718-lossy-image-compression.
Index Terms

Computer Science
Information Sciences

Keywords

Image compression. secure hash algorithm encryption