We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Fast and Secure Selective Encryption Scheme using Grid Division Method

by Priyanka Agrawal, Manisha Rajpoot
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Number 4
Year of Publication: 2012
Authors: Priyanka Agrawal, Manisha Rajpoot
10.5120/8031-1310

Priyanka Agrawal, Manisha Rajpoot . A Fast and Secure Selective Encryption Scheme using Grid Division Method. International Journal of Computer Applications. 51, 4 ( August 2012), 29-33. DOI=10.5120/8031-1310

@article{ 10.5120/8031-1310,
author = { Priyanka Agrawal, Manisha Rajpoot },
title = { A Fast and Secure Selective Encryption Scheme using Grid Division Method },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 51 },
number = { 4 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume51/number4/8031-1310/ },
doi = { 10.5120/8031-1310 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:49:32.464603+05:30
%A Priyanka Agrawal
%A Manisha Rajpoot
%T A Fast and Secure Selective Encryption Scheme using Grid Division Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 51
%N 4
%P 29-33
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

"Encryption is the primary solution to provide security to the data, which is travelling on a communication link between any pair of nodes, but Selective encryption is a technique to save computational power, overhead, speed, time and to provide quick security by only encrypting a selected portion of a bit stream. Securing the visual and multimedia data like images, requires specific design consideration for use in different applications. The focus of this paper is on selecting the important part of the image that can efficiently achieve by conceptually selecting the part of the image which is further used in its normal mode of operation for encryption. Once encryption is done, the encrypted data is sent along with remaining original part of the message, ensuring its secured transmission and distribution over public networks. . This paper proposes a new approach for image encryption using matrix or grid conversion of image. The main idea behind the present work is to select the part of the image by the arranging the bit stream in grid form and choosing the diagonal of the grid. The issue in traditional cryptosystem in many different areas such as wireless networking, mobile phone services and applications in homeland security is energy consumption for encryption of the large volume visual data. So we are dealing with a partial encryption algorithm of images. "

References
  1. P. Agrawal & M. Rajpoot, 2012. Partial Encryption Algorithm for Secure transmission of Multimedia messages. In proceedings of Int. J. Comp. Sci. , 3(1), . 467-70.
  2. Yonglin Ren, A. Boukerche and L. Mokdad, J. 2011. Performance Analysis of a Selective Encryption Algorithm for Wireless Ad hoc Networks, In proceedings of IEEE Wireless communications and networking conference,pp. 1038-1043.
  3. A. Massoudi, F. Lefebvre, and C. De Vleeschouwer, Eds. J. 2008. Secure and Low Cost Selective Encryption for JPEG2000", In Proceedings of 10th IEEE International Symposium on Multimedia, pp. 31–38.
  4. M. Podesser, H. Schmidt, and A. Uhl,J. 2002. Selective bitplane encryption for secure transmission of image data in mobile environments, In Proceedings of the 5th IEEE Nordic Signal Processing Symposium.
  5. F. Bao, and R. H. Deng,J. 2007. Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks, In proceedings of IEEE Global Telecommunications Conference, pp. 271–350.
  6. R. Gupta, A. Aggarwal, and Saibal K. ,J. 2012. Design and Analysis of New Shuffle Encryption Schemes for Multimedia,In proceedings of Defense Science Journal, Vol. 62, No. 3, May 2012, pp. 159-166.
  7. L. Jun, L. Zou, and C. Xie, Eds. ,J. 2006. A two-way selective encryption algorithm for MPEG video, Proceedings of International Workshop onNetworking, Architecture, and Storages.
  8. M. Aikawa, and K. Takaragi, Eds,J. 1998. A Lightweight Encryption Method Suitable for Copyright Protection,In proceedings of IEEE Transactions on Consumer Electronics, Vol. 44, pp. 902–910.
  9. S. Lian, Z. Liu, and Z. Ren, Eds. ,J. 2006. Secure advanced video coding based on selective encryption algorithms, In proceedings of IEEE Transactions on Consumer Electronics, Vol. 52, pp. 621–629.
  10. A. J. Prakash, and V. R. Uthariaraj,J. 2009. Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication,In Proceedings of 1st
  11. Int'l Conference on Networks and Communications, pp. 246–253.
  12. X. Yi, C. Tan, C. Siew, and S. Rahman,J. 2001. Fast encryption for multimedia,In proceedings of IEEE Transactions on Consumer Electronics, Vol. 47, No. 1, page(s): 101 – 107.
  13. L. Tang,J. 1996. Methods for encrypting and decrypting MPEG video data efficiently, In Proceedings of the Fourth ACM International Multimedia Conference (ACM Multimedia'96), pp. 219-230.
  14. C. Shi, and B. Bhargava,J. 1998. A fast MPEG video encryption algorithm, In Proceedings of the 6th ACM International Multimedia Conference, Bristol, UK.
  15. M. Ahmad and M. Shamsher Alam, J. 2009. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping, In proceedings of International Journal on Computer Science and Engineering, Vol. 2(1), 2009, 46-50.
  16. C. Wu, and C. Jay Kuo,2001. Efficient multimedia encryption via entropy codec design,In proceedings of SPIE International Symposium on Electronic Imaging.
  17. S. Agaian,A. Jassim,J. 2009. MobileMultimedia/Image Processing, Security, and Applications, Proceedings of SPIE, 0277-786X, v. 7351
Index Terms

Computer Science
Information Sciences

Keywords

Data confidentiality and protection symmetric key selective encryption and grid method