Farzana Kabir | Universitat Oberta de Catalunya (original) (raw)

Uploads

Papers by Farzana Kabir

Research paper thumbnail of HSV COLOR MODEL BASED ADVANCED IMAGE ENCRYPTION TECHNIQUE USING XOR AND SUBTRACTION OPERATION

Journal of Emerging Technologies and Innovative Research (JETIR), 2017

Image security is one of the major concern nowadays because of the tremendous growth of image tra... more Image security is one of the major concern nowadays because of the tremendous growth of image transmission over the internet for various purposes. Therefore, protecting the image from unwanted attacks and unauthorized access has become a crying need in the modern world. To prevent our personal and confidential image from various security attacks, a huge number of image encryption algorithms has been introduced till now. But still there exist some limitations in the encryption system that we need to work on, in order to make it more secure by applying a reliable and efficient encryption technique that is strong enough to protect the image from any kind of possible attacks. In this paper, an advanced color image encryption technique using HSV color model has been proposed. We convert the RGB color image to HSV format for better security purpose. Index Terms-Image, Encryption, HSV color model, XOR operation, Efficiency. I. INTRODUCTION Most of the image encryption algorithms use RGB color format to encrypt a color image. So, there may be hackers intelligent enough to decrypt the RGB color image. Therefore, we need to come up with a different solution to deal with the upcoming challenges like converting the RGB image to other color formats such as CMYK, HSV, HSL, YCbCr etc. Here, we propose a smart way to encrypt image using its HSV color model. In general, the HSV color format, which stands for Hue, Saturation, and Value, is used for human perception of an image but in this paper, we will use this HSV color format for completely different purpose. We will convert the RGB color image to HSV color format to make the image encryption more complex and stronger. After converting the image into HSV format, we will apply permutation algorithm to encode the pain HSV image into Cipher HSV image. R, G, and B components of a digital image are all correlated with the amount of light striking onto the object. Due to this reason, image descriptions in terms of those components make object discrimination difficult. Descriptions in terms of hue saturation are often more relevant. The complexity of this technique is much better than the RGB color image encryption. There is no single channel in RGB color space which is fully devoted to luminosity. Also, RGB color space is a device dependent color space. These are the reasons we have not chosen RGB color space and adopted HSV color space in our approach [9].

Research paper thumbnail of An advanced Double Domain image encryption technique using modified DCT encryption

Journal of Emerging Technologies and Innovative Research (JETIR), 2018

With the tremendous rise of information exchange via internet transmission, image security is bec... more With the tremendous rise of information exchange via internet transmission, image security is becoming an important issue that we need to deal with. As, images are being used more in business and industrial process, military and medical and also in scientific researches, it is really an important issue to protect the confidential image data from unwanted access or hackers. Because of improvement of technology, the attacking techniques, and hackers are also becoming more and more intelligent. Therefore, traditional techniques of image encryption are not up to the level to compete with the attackers. Image encryption has been a huge area of research study. The protection of image data is very important because it contains actual features and figures of a person or anything. Image encryption is used to secure an image from unauthorized access and increase image security in the internet. Nowadays Internet is used for transferring and loading huge amount of image data. Since the internet has many loopholes and several scopes of hacking or being attacked by unauthorized persons, our personal and confidential image need to be protected during transmission over internet. Researches did satisfactory amount of researches and invented variety of image encryption algorithms. But still there is need of improvement of the image encryption techniques to make it more secure. In this paper, we proposed an advanced double domain encryption technique that encrypts the image two times. First in frequency domain and secondly in spatial domain by using DCT (Discrete Cosine Transform) encryption and compression technique.

Research paper thumbnail of Color Image Encryption for Secure Transfer over Internet: A survey

International Research Journal of Engineering and Technology (IRJET) , 2017

With the tremendous and rapid growth of information interchange through internet transmission, in... more With the tremendous and rapid growth of information interchange through internet transmission, information security has become a major issue to deal with. As because images are being used more in business and industrial process, military and medical and also in scientific researches, it has become the important factor to protect the confidential image data from unwanted access or intruders. Because of development of technology, the hacking techniques, and attacks are also becoming more and more intelligent. As a result, traditional approaches of image encryption are failing to be a good competitor with the attackers. Image encryption has been a wide area of research field. The protection of image data is more important because it contains maximum features of a person or thing. Image encryption is employed to protect an image from unauthorized access and increase image security over internet. Nowadays Internet is used for transmitting and storing huge amount of information. Since the internet has many loopholes and several scopes of hacking or being attacked by intruders. So, our personal and private image need to be protected during transmission over internet. Researches have done satisfactory numbers of researches and developed lots of image encryption algorithms till now. In this paper, we illustrated a brief survey of some significant works regarding image encryption techniques in different domains and our main perspective will be to come up with a better solution to make images more secure in the future.

Research paper thumbnail of A Study on Privacy-Preserving Data Aggregation Techniques for Secure Smart Metering System

Due to the recent growth in the use of smart meters in smart homes, secure data aggregation in a ... more Due to the recent growth in the use of smart meters in smart homes, secure data aggregation in a smart metering system has become a challenging issue. Data aggregation is one of the solutions for securing the consumers' data by combining the meter reading at the gateway so that the attacker cannot identify an individual user's information. This paper provides a comprehensive review of recent works on secure and privacy-preserving technologies for smart meter data collection. In addition, a brief comparative analysis of some state-of-the-art privacy-preserving data aggregation schemes is presented in terms of security and privacy requirements, and performance evaluation. This review paper points out some research challenges and unique future directions for researchers. To the best of our knowledge, no prior work has addressed issues such as managing multiple attacks and aggregation of multidimensional data (water, gas and electricity consumption data).

Conference Presentations by Farzana Kabir

Research paper thumbnail of A Study on Privacy-Preserving Data Aggregation Techniques for Secure Smart Metering System

Reunión Española sobre Criptología y Seguridad de la Información (RECSI), 2021

Due to the recent growth in the use of smart meters in smart homes, secure data aggregation in a ... more Due to the recent growth in the use of smart meters in smart homes, secure data aggregation in a smart metering system has become a challenging issue. Data aggregation is one of the solutions for securing the consumers' data by combining the meter reading at the gateway so that the attacker cannot identify an individual user's information. This paper provides a comprehensive review of recent works on secure and privacy-preserving technologies for smart meter data collection. In addition, a brief comparative analysis of some state-of-the-art privacy-preserving data aggregation schemes is presented in terms of security and privacy requirements, and performance evaluation. This review paper points out some research challenges and unique future directions for researchers. To the best of our knowledge, no prior work has addressed issues such as managing multiple attacks and aggregation of multidimensional data (water, gas and electricity consumption data).

Research paper thumbnail of PROTECTION OF IMAGE OVER INTERNET USING DIFFERENT CHAOTIC ENCRYPTION METHOD: A SURVEY

AGU International Journal of Engineering & Technology , 2017

Image security is a very important area for today's research fields. It is essential so that any ... more Image security is a very important area for today's research fields. It is essential so that any data violation and corruption can be prevented. Due to the marvelous growth of information technology, security of image has become a major concern. Encryption is one of the ways to ensure high security for images. Image encryption plays an important role in the field of image security. Most of the image encryption techniques have some security and performance issues. In recent years, encryption technology has been developed quickly and many image encryption methods have been used to secure image from unauthorized access. Lots of image encryption algorithm has been executed in previous researches. The chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this paper we will analyze some of the chaotic image encryption methods used randomly for image security in order to find out a better solution form the previous results.

Research paper thumbnail of HSV COLOR MODEL BASED ADVANCED IMAGE ENCRYPTION TECHNIQUE USING XOR AND SUBTRACTION OPERATION

Journal of Emerging Technologies and Innovative Research (JETIR), 2017

Image security is one of the major concern nowadays because of the tremendous growth of image tra... more Image security is one of the major concern nowadays because of the tremendous growth of image transmission over the internet for various purposes. Therefore, protecting the image from unwanted attacks and unauthorized access has become a crying need in the modern world. To prevent our personal and confidential image from various security attacks, a huge number of image encryption algorithms has been introduced till now. But still there exist some limitations in the encryption system that we need to work on, in order to make it more secure by applying a reliable and efficient encryption technique that is strong enough to protect the image from any kind of possible attacks. In this paper, an advanced color image encryption technique using HSV color model has been proposed. We convert the RGB color image to HSV format for better security purpose. Index Terms-Image, Encryption, HSV color model, XOR operation, Efficiency. I. INTRODUCTION Most of the image encryption algorithms use RGB color format to encrypt a color image. So, there may be hackers intelligent enough to decrypt the RGB color image. Therefore, we need to come up with a different solution to deal with the upcoming challenges like converting the RGB image to other color formats such as CMYK, HSV, HSL, YCbCr etc. Here, we propose a smart way to encrypt image using its HSV color model. In general, the HSV color format, which stands for Hue, Saturation, and Value, is used for human perception of an image but in this paper, we will use this HSV color format for completely different purpose. We will convert the RGB color image to HSV color format to make the image encryption more complex and stronger. After converting the image into HSV format, we will apply permutation algorithm to encode the pain HSV image into Cipher HSV image. R, G, and B components of a digital image are all correlated with the amount of light striking onto the object. Due to this reason, image descriptions in terms of those components make object discrimination difficult. Descriptions in terms of hue saturation are often more relevant. The complexity of this technique is much better than the RGB color image encryption. There is no single channel in RGB color space which is fully devoted to luminosity. Also, RGB color space is a device dependent color space. These are the reasons we have not chosen RGB color space and adopted HSV color space in our approach [9].

Research paper thumbnail of An advanced Double Domain image encryption technique using modified DCT encryption

Journal of Emerging Technologies and Innovative Research (JETIR), 2018

With the tremendous rise of information exchange via internet transmission, image security is bec... more With the tremendous rise of information exchange via internet transmission, image security is becoming an important issue that we need to deal with. As, images are being used more in business and industrial process, military and medical and also in scientific researches, it is really an important issue to protect the confidential image data from unwanted access or hackers. Because of improvement of technology, the attacking techniques, and hackers are also becoming more and more intelligent. Therefore, traditional techniques of image encryption are not up to the level to compete with the attackers. Image encryption has been a huge area of research study. The protection of image data is very important because it contains actual features and figures of a person or anything. Image encryption is used to secure an image from unauthorized access and increase image security in the internet. Nowadays Internet is used for transferring and loading huge amount of image data. Since the internet has many loopholes and several scopes of hacking or being attacked by unauthorized persons, our personal and confidential image need to be protected during transmission over internet. Researches did satisfactory amount of researches and invented variety of image encryption algorithms. But still there is need of improvement of the image encryption techniques to make it more secure. In this paper, we proposed an advanced double domain encryption technique that encrypts the image two times. First in frequency domain and secondly in spatial domain by using DCT (Discrete Cosine Transform) encryption and compression technique.

Research paper thumbnail of Color Image Encryption for Secure Transfer over Internet: A survey

International Research Journal of Engineering and Technology (IRJET) , 2017

With the tremendous and rapid growth of information interchange through internet transmission, in... more With the tremendous and rapid growth of information interchange through internet transmission, information security has become a major issue to deal with. As because images are being used more in business and industrial process, military and medical and also in scientific researches, it has become the important factor to protect the confidential image data from unwanted access or intruders. Because of development of technology, the hacking techniques, and attacks are also becoming more and more intelligent. As a result, traditional approaches of image encryption are failing to be a good competitor with the attackers. Image encryption has been a wide area of research field. The protection of image data is more important because it contains maximum features of a person or thing. Image encryption is employed to protect an image from unauthorized access and increase image security over internet. Nowadays Internet is used for transmitting and storing huge amount of information. Since the internet has many loopholes and several scopes of hacking or being attacked by intruders. So, our personal and private image need to be protected during transmission over internet. Researches have done satisfactory numbers of researches and developed lots of image encryption algorithms till now. In this paper, we illustrated a brief survey of some significant works regarding image encryption techniques in different domains and our main perspective will be to come up with a better solution to make images more secure in the future.

Research paper thumbnail of A Study on Privacy-Preserving Data Aggregation Techniques for Secure Smart Metering System

Due to the recent growth in the use of smart meters in smart homes, secure data aggregation in a ... more Due to the recent growth in the use of smart meters in smart homes, secure data aggregation in a smart metering system has become a challenging issue. Data aggregation is one of the solutions for securing the consumers' data by combining the meter reading at the gateway so that the attacker cannot identify an individual user's information. This paper provides a comprehensive review of recent works on secure and privacy-preserving technologies for smart meter data collection. In addition, a brief comparative analysis of some state-of-the-art privacy-preserving data aggregation schemes is presented in terms of security and privacy requirements, and performance evaluation. This review paper points out some research challenges and unique future directions for researchers. To the best of our knowledge, no prior work has addressed issues such as managing multiple attacks and aggregation of multidimensional data (water, gas and electricity consumption data).

Research paper thumbnail of A Study on Privacy-Preserving Data Aggregation Techniques for Secure Smart Metering System

Reunión Española sobre Criptología y Seguridad de la Información (RECSI), 2021

Due to the recent growth in the use of smart meters in smart homes, secure data aggregation in a ... more Due to the recent growth in the use of smart meters in smart homes, secure data aggregation in a smart metering system has become a challenging issue. Data aggregation is one of the solutions for securing the consumers' data by combining the meter reading at the gateway so that the attacker cannot identify an individual user's information. This paper provides a comprehensive review of recent works on secure and privacy-preserving technologies for smart meter data collection. In addition, a brief comparative analysis of some state-of-the-art privacy-preserving data aggregation schemes is presented in terms of security and privacy requirements, and performance evaluation. This review paper points out some research challenges and unique future directions for researchers. To the best of our knowledge, no prior work has addressed issues such as managing multiple attacks and aggregation of multidimensional data (water, gas and electricity consumption data).

Research paper thumbnail of PROTECTION OF IMAGE OVER INTERNET USING DIFFERENT CHAOTIC ENCRYPTION METHOD: A SURVEY

AGU International Journal of Engineering & Technology , 2017

Image security is a very important area for today's research fields. It is essential so that any ... more Image security is a very important area for today's research fields. It is essential so that any data violation and corruption can be prevented. Due to the marvelous growth of information technology, security of image has become a major concern. Encryption is one of the ways to ensure high security for images. Image encryption plays an important role in the field of image security. Most of the image encryption techniques have some security and performance issues. In recent years, encryption technology has been developed quickly and many image encryption methods have been used to secure image from unauthorized access. Lots of image encryption algorithm has been executed in previous researches. The chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this paper we will analyze some of the chaotic image encryption methods used randomly for image security in order to find out a better solution form the previous results.