CFP last date
20 December 2024
Reseach Article

Lightweight Image Encryption Scheme for Multimedia Security

by Payal Maggo, Rajender Singh Chhillar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 13
Year of Publication: 2013
Authors: Payal Maggo, Rajender Singh Chhillar
10.5120/12422-9126

Payal Maggo, Rajender Singh Chhillar . Lightweight Image Encryption Scheme for Multimedia Security. International Journal of Computer Applications. 71, 13 ( June 2013), 43-48. DOI=10.5120/12422-9126

@article{ 10.5120/12422-9126,
author = { Payal Maggo, Rajender Singh Chhillar },
title = { Lightweight Image Encryption Scheme for Multimedia Security },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 13 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 43-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number13/12422-9126/ },
doi = { 10.5120/12422-9126 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:35:30.120129+05:30
%A Payal Maggo
%A Rajender Singh Chhillar
%T Lightweight Image Encryption Scheme for Multimedia Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 13
%P 43-48
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to abundant growth of multimedia application it becomes necessary to secure multimedia data. The scope of this paper is confined to secure multimedia data especially images. The major issue that exists in images is the presence of redundant data. The main focus of this paper is to design a new shuffling scheme that can eliminate redundant data . The new shuffling scheme has been implemented on different images. In this paper comparative analysis is done before and after applying new shuffling scheme with the existing PESH algorithm. The shuffling schemes are applied on pure white images in order to test its efficiency, as white images have maximum redundant data. The new scheme is designed for the light weight devices which require less computation power.

References
  1. M. A. EL-Wahed; S. Mesbah & A. Shoukry, "Efficiency and security of some image encryption algorithms", In the Proceedings of the World Congress on Engineering, 2008, 1, London, U. K.
  2. P. Maggo, Dr R. S. Chhillar, "Security of Multimedia Data: A Review Paper on various Image Security Algorithms", National Conference on Advanced Computing Technologies, Vol. 2, March 2013,pp. 852-857.
  3. R. Gupta, A. Aggarwal & S. K. Pal, "Design and Analysis of New Shuffle Encryption Schemes for Multimedia", Defence Science Journal, Vol. 62, No. 3, May 2012, pp. 159-166.
  4. F. Ahmed & C. L. Resch, "Characterizing cryptographic primitives for light weight digital image encryption", Mobile Multimedia/Image Processing, Security and Application 2009, edited by Sos S. Agaian, Sabah A. Jassim, Proc. Of SPIE Vol. 7371, 73510G.
  5. I. A. Ismail; M. Amin & H. Diab, "An efficient Image Encryption Scheme Based Chaotic Logistic Maps",In the Medwell online International Journal of Soft Computing 2(2):285-291,2007 .
  6. M. Abu Zaid Osama, A. El-Fishawy Nawal, E. M. Nigm and S. F. Osama, " A Proposed Encryption Scheme based on Henon Chaotic System (PESH) for Image Security", International Journal of Computer Applications (0975 – 8887) Volume 61– No. 5, January 2013
  7. El-Fishawy Nawal and M. Abu Zaid Osama, "Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms", International Journal of Network Security, Vol. 5, No. 3, PP. 241–251, Nov. 2007.
  8. M. A. B. Younes & A. Jantan, "An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption", IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 4, April 2008.
  9. Q. Zhang; Q. Wang & X. Wei, "A Novel Image Encryption Scheme Based on DNA Coding and Multi –Chaotic Maps", American Scientific Publishers Advanced Science Letters Vol. 3, 447-451, 2010.
  10. D. Socek, S. Li; S. S. Magliveras & B. Furht, "Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption", IEEE/CreateNetSecureComm, Athens, Greece, pp. 406-408, September 5-9, 2005.
  11. G. N. Krishnamurthy & V. Ramaswamy, "Making AES stronger: AES with Key dependent S-box", Int. J. Comp. Sci. Network Secu. , 2008, 8(9), pp. 388-98.
  12. C. Li & G. Chen, "On the security of a class of Image Encryption Schemes".
  13. D. Chattopadhyay ; M. K Mandal &D. Nandi , " Symmetric Key chaotic image encryption using circle map", Indian Journal of Science and Technology Vol. 4 No. 5 (May 2011) ISSN: 0974-6846.
Index Terms

Computer Science
Information Sciences

Keywords

Multimedia Security Image Security Algorithms Multimedia Security Analysis Image Encryption