Comment on ‘A technique for image encryption using digital signature’ (original) (raw)

Digital Signature Scheme for Image

International Journal of Computer Applications

Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on these images. To protect the authenticity of multimedia images, several approaches have been proposed. These approaches include conventional cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content. The aim of this paper is to present emerging technique for image authentication. It also introduces the new concept of image content authentication and discusses the most important requirements for an effective image authentication system design. Methods which are described provide strict or selective authentication, tamper detection, localization and reconstruction capabilities and robustness against different desired image processing operations.

A New Cryptographic Strategy for Digital Images Article Info ABSTRACT Corresponding Author

Journal of Electrical Engineering, 2014

In this paper, a new image block cipher encryption strategy for gray scale images using a different set of secret key and sizes is proposed. Initially, the swapping and dispersion is done without keys and in second stage the image is mixed with the chirikov map involving first secret key. 'N' rounds are taken to complete this process. The blended image is divided into blocks of block size 8X8.These blocks are also swapped to achieve good confusion. For making the encryption scheme more sturdy in each block the transmutation of pixels is done with the modified logistic map having three more secret keys. The proposed scheme is simple, rapid and sensitive to the secret key. Due to the high order of substitution, common attacks such as linear and differential cryptanalysis are unattainable. The experimental results show that the proposed encryption technique is effective and has high security features.

Security of Digital Images Using Cryptographic Algorithms

2019

Today, the world is going to be digitalized in all the ways. Every business units, government and private sectors, research units are using the digital image as transferring mode for every critical data. These images over the internet which will not be secure. Therefore, there is a need of image security. Currently, there exists various image security techniqueslike encryption, watermarking, steganography, etc.In this paper, we compared image encryption algorithms.Implementations of these algorithms have been realized for experimental purpose. The results of analysis are given in this paper.

A New Approach For Image Cryptography Techniques

With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia applications, security becomes an important issue of communication and storage of images Encryption and Decryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access.The principle goal of designing any encryption and decryption algorithm is to hide the original message and send the non readable text message to the receiver so that secret message communication can take place over the web. The strength of an algorithm depends on the difficulty of cracking the original message. In kind of algorithm .a combination of four S -boxes lookups, multiplications as well as fixed and data dependant rotations will be used. In this paper we would be obtaining our results by simulating the image processing by Encryption and Decryption part in MATLAB.

A New Cryptographic Strategy for Digital Images

International Journal of Electrical and Computer Engineering (IJECE), 2014

In this paper, a new image block cipher encryption strategy for gray scale images using a different set of secret key and sizes is proposed. Initially, the swapping and dispersion is done without keys and in second stage the image is mixed with the chirikov map involving first secret key. 'N' rounds are taken to complete this process. The blended image is divided into blocks of block size 8X8.These blocks are also swapped to achieve good confusion. For making the encryption scheme more sturdy in each block the transmutation of pixels is done with the modified logistic map having three more secret keys. The proposed scheme is simple, rapid and sensitive to the secret key. Due to the high order of substitution, common attacks such as linear and differential cryptanalysis are unattainable. The experimental results show that the proposed encryption technique is effective and has high security features.

Image Cryptosystem Based on Digital Signature and Double Random Phase Encoding

2015

This paper presents a new technique of multi-level security for image transmission based on image signature by Discrete Cosine Transform (DCT2) and image encryption by Double Random Phase Encoding (DRPE). This technique is implemented in two successive steps to enhance the security level of the transmitted image. The proposed technique exploits the benefits of signature and encryption, which make it robust to image processing attacks such as speckle, impulsive and Gaussian noise. Several experiments have been carried out to test the performance of the proposed technique in the terms of Peak Signal-to-Noise Ratio (PSNR), processing time and correlation coefficients. The obtained results show that, the proposed technique enhances the security level of the transmitted images with better immunity to noise when compared to stand-alone signature or DRPE. Key-Words: Digital image signature, Discrete Cosine Transform (DCT), Image encryption, Double Random Phase Encoding (DRPE).

A Survey Paper Based On Image Encryption and Decryption Technique

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

Nowadays multimedia system knowledge protection is changing into important. The coding technique is employed to safeguard multimedia system knowledge. There are completely different techniques wont to defend confidential image knowledge from unauthorized access. during this paper, we've got an inclination to survey existing work that's used entirely completely different techniques for image coding and that we to boot give a general introduction relating to cryptography.

Digital Image Cryptography using Index Keys

International Journal of Computer Science and Mobile Computing

A simple and easy to implement method of data cryptography will be introduced. This method can be easily used to encrypt-decrypt digital images with any type and size, it can be used to treat gray images, color images and secret messages. The simplified encryption and decryption function will minimize the required time for cryptography and they will use a simple operation of pixels’ values rearrangement to apply encryption and decryption. The values rearrangement is to be applied using a generated index key. The index key is generated using the chaotic logistic key formed by running a chaotic logistic map model using a selected values of chaotic parameters. The proposed method will increase the level of image protection by using a private key which is capable to increase the key space to resist hacking attacks. The proposed method will be tested and implemented using various images, the obtained results will be analyzed to prove the quality, efficiency and sensitivity of the propose...

A New Cryptographic Encryption Algorithm for Securing Digital Images

International Journal of Computer Applications, 2014

This paper proposed a new algorithm for digital image encryption. The proposed algorithm encrypts an mxn size image by using the set of array pixel values. At the end, plain images will be encrypted using the algorithm and analysis will be performed on the ciphered images to determine the efficiency of the algorithm in ciphering the image. The algorithm ultimately makes it possible for encryption and decryption of the images to be done based on the RGB pixel. The algorithm was implemented using MATLAB.