Secure Image encryption through key hashing and wavelet transform techniques

نویسنده

  • Tapas Bandyopadhyay
چکیده

To provide security of the images in the multimedia environment encryption plays an important role. The traditional cryptographic algorithm such as AES, DES, TDES, RSA, IDEA, etc. are not so effective for image encryption because of their slow processing speed, inherent features of image data like bulk data capacity, high redundancy and ineffectiveness in removing the correlations of the adjacent pixels of the image[1],[2]. In order to cope with this problem a noble technique of digital image encryption is proposed. In this technique the symmetric key is used for image encryption. The hash value (SHA1) of the key file is generated and stored as text file [4],[5]. The SHA test is converted to binary string. The key hash value is now expanded to match with the image dimension. For creating confusion the image to be encrypted is wavelet transform is first calculated and then converted into binary string and the hash of the secret key value (SHA1) is finally bitxored to create the encrypted image. The experimental results, correlation analysis of adjacent pixels of encrypted image in the horizontally, vertically and diagonally spaced pixels, histogram analysis and Structural Similarity Index Measure (SSIM), tests have been carried out and results are found to be quite satisfactory in terms of security and performance. Keywords-Cipher text, Encryption, Decryption, SHA, symmetric key, image histogram, Correlation coefficient, Structural Similarity Index Measure (SSIM)

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform

Along with the rapid increasing growth of computer and network technologies, images are being transmitted more and more frequently. Security of image is a big issue. Image information is lively and visual, and has been an important means of expressing information of person. There are many encryption algorithm had been available each one having some strength and weakness. Image cryptography can ...

متن کامل

A Robust Watermarking Approach using DCT-DWT

This paper presents a robust watermarking technique for color and grayscale image. The proposed method involves many techniques to conform a secure and robust watermarking. In the proposed technique the watermark is embedded in 3 level of DWT (Discrete Wavelet Transform) and before embedding the watermark image is passed through chaotic encryption process for its security, other important thing...

متن کامل

A Novel Method of Image Encryption Using Logistic Mapping

In this paper, we proposed a new method to develop secure image-encryption techniques using a logistics -based encryption algorithm. In this technique, a Haar wavelet transform was used to decompose the image and decorrelate its pixels into averaging and differencing components. The logistic based encryption algorithm produces a cipher of the test image that has good diffusion and confusion pro...

متن کامل

Image Encryption Using Huffman Coding for Steganography, Elliptic Curve Cryptography and DWT for Compression

An abstract is a brief summary of a research article or in-depth analysis of a particular subject or discipline, and is often used to help the reader quickly ascertain the paper's purpose. Images can be encrypted in several ways, by using different techniques and different encryption methods. In this paper, I am using Huffman Coding method for image steganography, Elliptic Curve Cryptography fo...

متن کامل

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012