We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Adaptive Cryptosystem for Digital Images using Fibonacci Bit-Plane Decomposition

by Ravindranath C. C, Aditya Kumar Bhatt, Aditi Bhatt
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 14
Year of Publication: 2013
Authors: Ravindranath C. C, Aditya Kumar Bhatt, Aditi Bhatt
10.5120/10994-6163

Ravindranath C. C, Aditya Kumar Bhatt, Aditi Bhatt . Adaptive Cryptosystem for Digital Images using Fibonacci Bit-Plane Decomposition. International Journal of Computer Applications. 65, 14 ( March 2013), 32-36. DOI=10.5120/10994-6163

@article{ 10.5120/10994-6163,
author = { Ravindranath C. C, Aditya Kumar Bhatt, Aditi Bhatt },
title = { Adaptive Cryptosystem for Digital Images using Fibonacci Bit-Plane Decomposition },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 14 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 32-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number14/10994-6163/ },
doi = { 10.5120/10994-6163 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:18:50.421831+05:30
%A Ravindranath C. C
%A Aditya Kumar Bhatt
%A Aditi Bhatt
%T Adaptive Cryptosystem for Digital Images using Fibonacci Bit-Plane Decomposition
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 14
%P 32-36
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we introduce a novel encryption algorithm based on Fibonacci numbers. In addition, novel bit-plane decomposition for Fibonacci weights is also discussed that offers cryptographic benefits. The new lossless image encryption algorithm is presented can encrypt an image using this new decomposition method for privacy protection. Further, it has two levels of encryption that could address both pay-per-view applications or secured communication simultaneously. Simulation results and analysis verify that the algorithm shows good performance in image encryption.

References
  1. D. Schneier, Applied Cryptography, John Wiley & Son, Inc. , New York, NY, 1996
  2. A. M. Eskicioglu, "Multimedia Security in Group Communications: Recent Progress in key management, authentication, and watermarking", Multimedia Systems, vol. 9, no. 3, Springer-Verlag Berlin/Heidelberg, pp. 239 – 248, 2003
  3. B. Furht, D. Socek, and A. M. Eskicioglu, "Fundamentals of Multimedia Encryption Techniques," Chapter in Multimedia Security Handbook, pp. 94 – 144, CRC Press, 2005
  4. L. Chuanmu and H. Lianxi, "A new image encryption scheme based on hyper chaotic sequences", IEEE International Workshop on Anti-counterfeiting, Security, Identification, 16-18 April 2007, pp. 237 – 240
  5. Fakariah Hani Mohd Ali, Ramlan Mahmod, Mohammad Rushdan and Ismail Abdullah, "A Faster Version of Rijndael Cryptographic Algorithm Using Cyclic Shift and Bit Wise Operations", International Journal of Cryptology Research pp: 215-223 (2009).
  6. Yicong Zhou; Panetta, K. ; Agaian, S. ; "An image scrambling algorithm using parameter bases M-sequences", International Conference on Machine Learning and Cybernetics, Vol 7, July 2008 pp:3695 – 3698
  7. Yicong Zhou, Karen Panetta, Ravindranath Cherukuri and Sos Agaian, "Selective object encryption for privacy protection", Proc. SPIE 7351, 73510F (2009); doi:10. 1117/12. 817699
  8. Jiancheng Zou; Ward, R. K. ; Dongxu Qi; "The generalized Fibonacci transformations and application to image scrambling", IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol 3, 17-21 May 2004, pp 385-388.
  9. Jiancheng Zou; Ward, R. K. ; Dongxu Qi; "A new digital image scrambling method based on Fibonacci numbers", International Symposium on Circuits and Systems, ISCAS '04, Vol 3, 23-26 May 2004, pp:III - 965-8.
  10. Dey. S. , Abraham. A. , Sanyal. S, "An LSB data hiding technique using prime numbers", Third international symposium on Information assurance and security, pp 101-108, (2007).
  11. Dey. S. , Abraham. A. , Sanyal. S, "An LSB data hiding technique using natural numbers decomposition", Third international conference on Intelligent information Hiding and Multimedia Signal Processing, vol. 2, pp 473-476, (2007).
  12. Basin, S. L. and Hoggatt, V. E. Jr. "A primer on the Fibonacci Sequence", Fib. Qurat. 1, 1963
  13. Ravindranath C. Cherukuri and Sos S. Agaian, "New normalized expansions for redundant number systems: adaptive data hiding techniques", Proc. SPIE 7542, 754206 (2010); doi:10. 1117/12.
Index Terms

Computer Science
Information Sciences

Keywords

Image scrambling encryption fibonacci bit-plane decomposition secured communication