CFP last date
20 January 2025
Reseach Article

Secure Schematic Model for Verifying Encrypted Image using Invariant Hash Function

Published on October 2013 by Smita R. Chunamari, D. G. Borse
International conference on Green Computing and Technology
Foundation of Computer Science USA
ICGCT - Number 2
October 2013
Authors: Smita R. Chunamari, D. G. Borse
e078d494-e3cf-42e5-af01-2510b88d340b

Smita R. Chunamari, D. G. Borse . Secure Schematic Model for Verifying Encrypted Image using Invariant Hash Function. International conference on Green Computing and Technology. ICGCT, 2 (October 2013), 39-45.

@article{
author = { Smita R. Chunamari, D. G. Borse },
title = { Secure Schematic Model for Verifying Encrypted Image using Invariant Hash Function },
journal = { International conference on Green Computing and Technology },
issue_date = { October 2013 },
volume = { ICGCT },
number = { 2 },
month = { October },
year = { 2013 },
issn = 0975-8887,
pages = { 39-45 },
numpages = 7,
url = { /proceedings/icgct/number2/13693-1320/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International conference on Green Computing and Technology
%A Smita R. Chunamari
%A D. G. Borse
%T Secure Schematic Model for Verifying Encrypted Image using Invariant Hash Function
%J International conference on Green Computing and Technology
%@ 0975-8887
%V ICGCT
%N 2
%P 39-45
%D 2013
%I International Journal of Computer Applications
Abstract

In post globalization era of computer networks and communication, image and video plays a significance role; rather the fashion of text based systems will be replaced by the image based system. The associated threats and challenges related to image security and its authentication is an active research issues. In order to ensure a full proof security mechanism for image the notion of message authentication code for data authentication and notion of encryption for preserving confidentiality need to be combined. In this paper a complete frame work of crypto-system has been proposed, where the parameterization of hash value of encrypted image is done in such a way that it should be exactly same with zero difference error of hash value that of the parent unencrypted original image. It will have enormous scope into various medical imaging systems where privacy preservation is an important issue. Designing parametric hashing algorithm, which is invariant to encryption only by accepting small part of statistical signature of the original unencrypted image to emerge despite the encryption process is a non trivial task. The proposed work formulates authentication of encrypted data by using notion of authentication code and a novel but yet simple hashing algorithm which are usable with encrypted image s. The implementation results of various images, where the hash value is being computed without the decryption of the original input image, thus validates the authentication without compromising the privacy information. Since the hash value is computed without decrypting the original data, one can prove authenticity without actually revealing the information.

References
  1. O. S. Faragallah, Utilization of Security Techniques for Multimedia Applications , Ph. D. Thesis, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University, 2007.
  2. A. J. Menezes, P. C. V. Oorschot and S. Vanstone, Handbook of Applied Cryptography, CRC Press Boca Raton,USA, 1996.
  3. L. Qiao, Multimedia Security and Copyright Protection , Ph. D. Thesis, Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, Illinois, USA, 1998.
  4. W. Stallings, Cryptography and Network Security: Principles and Practice, Prentice- Hall Upper Saddle River, USA, 1999.
  5. C. E. Shannon, Communication Theory of Secrecy Systems, Bell System Technical Journal, Vol. 28, No. 4, pp. 656-715, October 1949.
  6. S. Li, G. Chen and X. Zheng, Chaos-Based Encryption for Digital Images and Videos, Chapter 4 in Multimedia Security Handbook, CRC Press LLC, February 2004.
  7. Y. Mao and M. Wu, A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption, IEEE Transactions on Image Processing, Vol. 15, No. 7, pp. 2061-2075, July 2006.
  8. Y. Mao, Research on Chaos-Based Image Encryption and Watermarking Technology, Ph. D. Thesis, Department of Automatation, Nanjing University of Science & Technology, Nanjing, China, August 2003.
  9. J. Daemen and V. Rijmen, AES Proposal: Rijndael, AES Algorithm Submission, 1999.
  10. R. L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin, The RC6TM Block Cipher , M. I. T laboratory for Computer Science, 545 Technology Square, Cambridge, MA 02139, USA, 1998.
  11. R. F. Sewell, Bulk Encryption Algorithm for Use with RSA , Electronics Letters , Vol. 29, No. 25, pp. 2183-2185, 9 Dec. 1993.
  12. H. E. H. Ahmed, H. M. Kalash, and O. S. Faragallah, Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , International Conference on Electrical Engineering (ICEE '07), pp. 1-7, 11-12 April 2007.
  13. Z. Lv, L. Zhang, and J. Guo, "A Symmetric Image Encryption Scheme Based on Composite Chaotic Dispersed Dynamics System," Proc. Of Second Symposium on Computer Science and Computational Technology, pp. 191–194, 2009.
  14. M. Zeghid, M. Machhout, L. Khriji, A. Baganne, R. Tourki, ?A Modified AES Based Algorithm for Image Encryption?, World Academy of Science, Engineering and Technology 27 2007.
  15. Mohammad Ali Bani Younes and Aman Jantan ?Image Encryption Using Block-Based Transformation Algorithm? IAENG International Journal of Computer Science, 35,2008.
  16. Mohammad Ali Bani Younes and Aman Jantan, ?An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption?, IJCSNS International Journal of Computer Science and Network Security, VOL. 8 , April 2008.
  17. Saroj Kumar Panigrahy, Bibhudendra Acharya and Debasish Jen?, Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm 1st t International Conference on Advances in Computing, Chikhli, India, 21-22 February 2008.
  18. Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, Image Encryption Using Advanced Hill Cipher Algorithm, International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009.
  19. Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan , Dai Wei-di, Digital image encryption algorithm based on chaos and improved DES?, IEEE International Conference on Systems, Man and Cybernetics, 2009.
  20. Kamali, S. H. , Shakerian, R. , Hedayati, M. ,Rahmani, M. , A new modified version of Advance Encryption Standard based algorithm for image encryption, Electronics and Information Engineering (ICEIE), 2010 International Conference.
  21. Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. Sarkar Partha Pratim Sarkar, ?Image Encryption Using Affine Transform and XOR Operation?, International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011).
  22. Sesha Pallavi Indrakanti, P. S. Avadhani, Permutation based Image Encryption Technique, International Journal of Computer Applications (0975 – 8887) Volume 28– No. 8, 2011.
  23. Kuldeep Singh, Komalpreet Kaur, Image Encryption using Chaotic Maps and DNA Addition Operation and Noise Effects on it?, International Journal of Computer Applications (0975 – 8887) Volume 23– No. 6, June 2011.
  24. Qais H. Alsafasfeh , Aouda A. Arfoa, Image Encryption Based on the General Approach for Multiple Chaotic Systems, Journal of Signal and Information Processing, 2011.
  25. Ibrahim S I Abuhaiba, Maaly A S Hassan, ?Image Encryption Using Differential Evolution Approach In Frequency Domain? Signal & Image Processing: An International Journal (SIPIJ) Vol. 2, No. 1, March 2011.
  26. Tariq Shah, Iqtadar Hussain, Muhammad Asif Gondal , Hasan Mahmood, Statistical analysis of S-box in image encryption applications based on majority logic criterion, International Journal of the Physical Sciences Vol. 6(16), pp. 4110-4127, 18 August, 2011
Index Terms

Computer Science
Information Sciences

Keywords

Image Encryption Hash Function Encryption Secure Key.