CFP last date
20 January 2025
Reseach Article

Certain Investigations of Image Security Algorithms for Ad hoc Networks

Published on March 2013 by S. Kumar, P. Sivaprakasam
International Conference on Innovation in Communication, Information and Computing 2013
Foundation of Computer Science USA
ICICIC2013 - Number 1
March 2013
Authors: S. Kumar, P. Sivaprakasam
f3cccf58-16bc-477d-87d9-d10f74ca7c88

S. Kumar, P. Sivaprakasam . Certain Investigations of Image Security Algorithms for Ad hoc Networks. International Conference on Innovation in Communication, Information and Computing 2013. ICICIC2013, 1 (March 2013), 28-33.

@article{
author = { S. Kumar, P. Sivaprakasam },
title = { Certain Investigations of Image Security Algorithms for Ad hoc Networks },
journal = { International Conference on Innovation in Communication, Information and Computing 2013 },
issue_date = { March 2013 },
volume = { ICICIC2013 },
number = { 1 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 28-33 },
numpages = 6,
url = { /proceedings/icicic2013/number1/11289-1314/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovation in Communication, Information and Computing 2013
%A S. Kumar
%A P. Sivaprakasam
%T Certain Investigations of Image Security Algorithms for Ad hoc Networks
%J International Conference on Innovation in Communication, Information and Computing 2013
%@ 0975-8887
%V ICICIC2013
%N 1
%P 28-33
%D 2013
%I International Journal of Computer Applications
Abstract

Ad hoc Networks allows for communicating users in communication without relying on a infrastructure. The model of communication depends on the topology of the network. The users rely on the security protocols and security algorithms that are part of the network standard. The information being exchanged could be text ,image, video based on the user's requirement. There is a need for algorithms to be robust to avoid information loss. The data to be transmitted has to be protected from the intruders as it could result in reduction of credibility. The paper performs a exhaustive study of different security algorithms in ad hoc network. It concentrates on understanding the difficulties in handling the information I,e image across users. The paper presents a complete survey of the different security algorithms available for handling images. The information to be transmitted along with the images also needs to be analyzed for its complexity,size and vulnerabity. The paper presents research directions for transmitting images in adhoc networks in a efficient manner considering the different performance parameters that needs to be managed.

References
  1. N. El-Fishawy, "Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms", International Journal of Network Security, Nov. 2007, PP. 241–251
  2. Diaa Salama Abdul. Elminaam1, Hatem ohamed Abdul Kade and Mohie Mohamed Hadhoud, "Performance Evaluation of Symmetric encryption Algorithms", IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 12, December 2008
  3. Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah, "Encryption Efficiency Analysis and security Evaluation of RC6 Block Cipher for Digital Images", International Conference on Electrical Engineering, April 2007
  4. Bruce Schneier, "Applied Cryptography – Protocols, algorithms, and source code in C", John Wiley & Sons, Inc. , New York, second edition, 1996
  5. Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah,"Encryption Quality Analysis of RC5 Block Cipher Algorithm for Digital Images", Journal of Optical Engineering, vol. 45, 2006.
  6. W. Stallings, "Network and Internetwork Security: ice",Prentice- Hall, New Jersey, 1995.
  7. Man Young Rhee, "Internet Security Cryptographic Principles, Algorithms and Protocols", John Wiley & Sons Ltd, 2003.
  8. T. Pevn´y and J. Fridrich. "Merging Markov and DCT features for multi-class JPEG steganalysis". In E. J. Delp and P. W. Wong, editors, Proceedings SPIE,Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 3 1–3 14, San Jose, CA, January 29 –February 1, 2007
  9. J. Fridrich. "Feature-based steganalysis for JPEG images and its Implications for future design of steganographic scheme". In J. Fridrich, editor, Information Hiding, 6th International Workshop, volume 3200 of Lecture Notes in Computer Science, pages 67–81, 2005.
  10. Avcibas, M. Kharrazi, N. Memon, and B. Sankur, "Image steganalysis with binary similarity measures," EURASIP J. Appl. Signal Process. 2005 (17), 2749–2757(2005).
  11. M. Kharrazi, H. T. Sencar, and N. Memon. "Benchmarking steganographic and steganalytic techniques". In Proceedings of SPIE Electronic Imaging, Security,Steganography and Watermarking of Multimedia Contents VII, San Jose, CA, 2005.
  12. D. C. Wu, and W. H. Tsai, "A Steganographic Method for Images By Pixel Value Differencing", Pattern Recognition Letters, Vol. 24, pp. 1613–1626, 2003
  13. Vajiheh Sabeti, Shadrokh Samavi, Mojtaba Mahdavi, Shahram Shirani, "Steganalysis of Pixel-Value Differencing Steganographic Method", IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2007, pp. 292-295,22-24Aug. 2007
  14. S. -L. Li, K. -C. Leung, L. -M. Cheng, and C. -K. Chan, "Data Hiding In Images By Adaptive LSB Substitution Based On The Pixel-Value Differencing", First International Conference on Innovative Computing, Information and Control (ICICIC'06), Vol. 3, pp. 58-61, 2006
  15. H. C. Wu, N. I. Wu, C. S. Tsai, and M. -S. Hwang, "Image Steganographic Scheme Based On Pixel-Value Differencing and LSB Replacement Methods", IEE Proceedings on Vision, Image and Signal Processing, Vol. 152, No. 5, pp. 611-615, 2005
  16. Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, and Te-Ming Tu, "A Novel Image Steganographic Method Using Tri-Way Pixel-Value Differencing", National Science Council, R. O. C, © 2008 Academy Publisher
  17. Cox I. J. , Miller M. L. , Boom J. A. , Jessica Fridrich, " Digital Watermarking And Steganography", 2nd edition, Morgan Kaufmann publishers, 2008
  18. Y. K. Lee, L. H. Chen, "High Capacity Image Steganographic Model", IEE Proceedings on Vision, Image and Signal Processing, Vol. 147, No. 3, pp. 288-294, 2000
Index Terms

Computer Science
Information Sciences

Keywords

Ad Hoc Network Security Algorithm Key Size Graph Complexity