CFP last date
20 January 2025
Reseach Article

An Enhanced Pixel-Shuffling based Approach to Simultaneously Perform Double-DCT Image Compression, Encryption and Secondary-Steganography

by Navita Agarwal, Himanshu Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 75 - Number 7
Year of Publication: 2013
Authors: Navita Agarwal, Himanshu Sharma
10.5120/13120-0406

Navita Agarwal, Himanshu Sharma . An Enhanced Pixel-Shuffling based Approach to Simultaneously Perform Double-DCT Image Compression, Encryption and Secondary-Steganography. International Journal of Computer Applications. 75, 7 ( August 2013), 1-9. DOI=10.5120/13120-0406

@article{ 10.5120/13120-0406,
author = { Navita Agarwal, Himanshu Sharma },
title = { An Enhanced Pixel-Shuffling based Approach to Simultaneously Perform Double-DCT Image Compression, Encryption and Secondary-Steganography },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 75 },
number = { 7 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume75/number7/13120-0406/ },
doi = { 10.5120/13120-0406 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:43:36.363349+05:30
%A Navita Agarwal
%A Himanshu Sharma
%T An Enhanced Pixel-Shuffling based Approach to Simultaneously Perform Double-DCT Image Compression, Encryption and Secondary-Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 75
%N 7
%P 1-9
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's world of advanced and fast growing network, each and every type of digital information is communicated via internet. The demand of the time is the implementation of an effective, sensitive and less time consuming encryption system that can be secured from unauthorized access. Typical encryption systems have played marvelous role for the systematic working of modern day cryptography as it is necessary to encrypt the digital image before their transmission over the network. So, an enhanced approach is proposed for Image Compression by Discrete Cosine Transform (DCT), Encryption and Decryption by Pixel Shuffling and Steganography by double image hiding to affirm the increased security of the previous approach.

References
  1. (2001) The Wikipedia website. Available: http://en. wikipedia. org/wiki/ Cryptography
  2. Somdip Dey, "SD-EI: A Cryptographic Technique To Encrypt Images," IEEE Journal, pp. 28-32.
  3. (2012) The RSA Laboratories website. [Online]. Available: http://www. rsa. com/products/bsafe/whitepa pers/DDES_WP_0702. pdf
  4. (2005) The CNBC website. [Online]. http://www. cnbc . cmu. edu/~tai/papers/brian_josa. pdf
  5. Suli Wu, Yang Zhang, Xu Jing, "A Novel Encryption Algorithm based on Shifting and Exchanging Rule of Bi- Column Bi-row Circular Queue," Computer Science and Software Engineering, IEEE International Conference on, 2008, pp. 841-844.
  6. H. H. Nien, S. K. Changchien, S. Y. Wu, C. K. Huang, "A New Pixel-Chaotic-Shuffle Method for Image Encryption," Control, Automation, Robotics and Vision, IEEE 10th International Conference on, 17-20 December 2008, pp. 883-887.
  7. Vinod Patidar G. Purohit, K. K. Sud, N. K. Pareek, "Image encryption through a novel permutation-substitution scheme based on chaotic standard map," Chaos-Fractal Theory and its Applications, IEEE International Workshop on, 2010, pp. 164-169.
  8. Huan Zhang, Ruhua Cai, "Image Encryption Algorithm Based on Bit-Plane Scrambling and Multiple Chaotic Systems Combination," IEEE Journal, 2010, pp. 113-117.
  9. Nidhi Sethi, Deepika Sharma, "A New Cryptology approach for Image Encryption," Parallel, Distributed and Grid Computing, IEEE 2nd International Conference on, 2012, pp. 905-908
  10. Reji Mathews, Amnesh Goel, Prachur Saxena & Ved Prakash Mishra, "Image Encryption Based on Explosive Inter-pixel Displacement of the RGB Attributes of a PIXEL", Proceedings of the World Congress on Engineering and Computer Science, vol. I, October 19-21, 2011.
  11. Dr. Gabriel Cristobal, Prof. Dr. Peter Schelkens, Prof. Hugo Thienpont, Bing Qi, Li Qian and Hoi-Kwong Lo, "Optical and Digital Image Processing: Fundamentals and Applications," Canada: Wiley-VCH Verlag GmbH & Co. KGaA, 29 April 2011.
  12. Navita Agarwal, Himanshu Sharma, "An efficient pixel shuffling based approach to simultaneously perform image compression, encryption and steganography," International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 2, issue. 5, May 2013, pp. 376 – 385
  13. Amnesh Goel, Nidhi Chandra, "A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based On Sorting Group-Wise Of RGB Values and Explosive Inter-Pixel Displacement," I. J. Image, Graphics and Signal Processing, 2012, pp. 16-22.
  14. (2008) Cardiff School of Computer Science and Informatics Website. [Online]. Available: http://www. cs. cf. ac. uk/Dave/Multimedia/node231. html
  15. (2010) The IAENG website. [Online]. Available: http:// www. iaeng. org/IJCS/issues_v35/issue_1/IJCS_35_1_03. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Image Security DCT Compression Encryption Decryption Pixel Shuffling Steganography Double Image Hiding