CFP last date
20 December 2024
Reseach Article

Secure Transmission of an Image using Partial Encryption based Algorithm

by Parameshachari B D, K M Sunjiv Soyjaudah, Sumitra Devi K A
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 16
Year of Publication: 2013
Authors: Parameshachari B D, K M Sunjiv Soyjaudah, Sumitra Devi K A
10.5120/10553-5746

Parameshachari B D, K M Sunjiv Soyjaudah, Sumitra Devi K A . Secure Transmission of an Image using Partial Encryption based Algorithm. International Journal of Computer Applications. 63, 16 ( February 2013), 33-36. DOI=10.5120/10553-5746

@article{ 10.5120/10553-5746,
author = { Parameshachari B D, K M Sunjiv Soyjaudah, Sumitra Devi K A },
title = { Secure Transmission of an Image using Partial Encryption based Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 16 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number16/10553-5746/ },
doi = { 10.5120/10553-5746 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:14:32.346642+05:30
%A Parameshachari B D
%A K M Sunjiv Soyjaudah
%A Sumitra Devi K A
%T Secure Transmission of an Image using Partial Encryption based Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 16
%P 33-36
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access. In this paper we propose a novel concept of combined partial image encryption using phase manipulation and sign encryption. Entire encryption process involves two stages where image to be encrypted are applied to phase manipulation block. In first stage Fourier Transform (FT) is applied to get phase and magnitude of the input image. Phase of the image are scrambled to get modified image after applying Inverse Fourier Transform. In second stage the modified image is partially encrypted by using sign encryption. Sign Encryption finally gives resultant partially encrypted image by extracting the sign bits of modified image. Experiment is conducted for an image using MATLAB software. From the experiment we obtained partially encrypted image at the end of encryption process. Decryption process employs exactly reverse process of encryption which results in the reconstructed images.

References
  1. Schneier B. , 1996, "Applied Cryptography, Second Edition: Protocols, Algorithms and Source Code in C", John Wiley & Sons, Inc. , USA.
  2. Borie J. , Puech W. , Dumas M. , 2004, "Crypto-Compression System for Secure Transfer of Medical Images", 2nd International Conference on Advances in Medical Signal and Information Processing (MEDSIP 2004).
  3. Prasanna SRM et al, 2006, "An image encryption method with magnitude and phase manipulation using carrier images", IJCS 1(2):132–137
  4. H. Cheng and X. Li. 2000, "Partial Encryption of Compressed Images and Video", IEEE Transactions on Signal Processing, 48(8), pp. 2439-2451.
  5. Howard Cheng and Xiaobo Li, 2002, "Partial Encryption of Compressed Images and Videos," IEEE Transaction on Signal Processing, Vol. 48, No. 8, , pp. 2439- 2451.
  6. M. Podesser, H. P. Schmidt and A. Uhl. 2002, "Selective Bitplane Encryption for Secure Transmission of Image Data in MobileEnvironments", 5th Nordic Signal Processing Symposium, on board Hurtigruten, Norway, October 4-7.
  7. W. Zeng and S. Lei, 2003, "Efficient Frequency Domain Selective Scrambling of Digital Video," IEEE Transactions on Multimedia, Vol. 5, No. 1, pp. 118–129.
  8. Pfarrhofer, R. , Uhl, A. 2005, "Selective Image Encryption Using JBIG" In: Dittmann, J. , Katzenbeisser, S. , Uhl, A. (eds. ) CMS 2005. LNCS, vol. 3677, pp. 98–107. Springer, Heidelberg.
  9. D. Engel and A. Uhl, 2006, "Lightweight JPEG2000 encryption with anisotropic wavelet packets," in Proceedings of IEEE International Conference on Multimedia and Expo (ICME ?06), pp. 2177–2180, Toronto, Canada.
  10. Nidhi S Kulkarni, Balasuramanian and Indra Gupta. 2008, "Selective encryption of multimedia images", XXXII National Systems Conference, NSC 2008, December 17-19.
  11. Hammed A younis,Turki Y Abdalla and Abdulkareem Y Abdalla,2009, "Vector Quantization Techniques For Partial Encryption of Wavelet Compressed Digital Images" ,Iraq Journal Electrical and Electronic Engineering.
  12. Ju-Young Oh, Dong-Il Yang, Ki-Hwan Chon, 2010, "A Selective Encryption Algorithm Based on AES for Medical Information", the Korean Society of Medical Informatics.
  13. Joshi, J. M. , Dalal, U. D. , 2011, "Selective Encryption using ISMA Cryp in Real Time Video Streaming of H. 264/AVC for DVB-H Application", World Academy of Science, Engineer- ing and Technology 79.
  14. Parameshachari B D and Dr. K M Soyjaudah, 2012, "A Study of Binary Image encryption using Partial Image Encryption Technique" International Journal of Modern Engineering Research (IJMER), Vol. 2, Issue. 3, pp-955-959.
  15. Parameshachari B D and Dr. K M S Soyjaudah, 2013, "A New Approach to Partial Image Encryption" Proceedings of ICAdC, AISC 174, pp. 1005–1010, © Springer India 2013.
  16. Parameshachari B D, Panduranga H T and Dr. K M S Soyjaudah, 2012, "A Overview on Partial Image Encryption Approaches", International Journal of Engineering Research and Development (IJERD), Volume 1, Issue 2, pp. 49-54.
Index Terms

Computer Science
Information Sciences

Keywords

Decryption Phase manipulation partial encryption sign encryption